Lucene search

K

LinPHA 0.9.x/1.0 sec_stage_install.php language Parameter Local File Inclusion

๐Ÿ—“๏ธย 01 Jul 2014ย 00:00:00Reported byย RootTypeย 
seebug
ย seebug
๐Ÿ”—ย www.seebug.org๐Ÿ‘ย 9ย Views

LinPHA 0.9.x/1.0 sec_stage_install.php local file inclusion & code injection vulnerabilitie

Show more
Code

                                                source: http://www.securityfocus.com/bid/16592/info
  
LinPHA is prone to multiple local file-inclusion and PHP code-injection vulnerabilities. The local file-inclusion issues are due to insecure use of the 'include_once()' PHP function in multiple scripts. The PHP code-injection vulnerabilities are due to insufficient input validation of data that is saved to log files.
  
This will permit an attacker to influence the include path to point to files that are hosted on the computer that is running the affected application. In this manner, files that are readable by the webserver process may be output to the attacker.
  
Attackers may also inject arbitrary PHP code into the log files and cause it to be interpreted. This would occur in the context of the server hosting the application.

http://www.example.com/[path]/install/sec_stage_install.php?whatlang=1&language=/../../../../../../../test
http://[target]/[path]/install/sec_stage_install.php?language=/../../../../../../../test
                              

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
01 Jul 2014 00:00Current
7.1High risk
Vulners AI Score7.1
9
.json
Report