exploit-db-mirror/exploits/php/webapps/13777.txt
Offensive Security d63de06c7a DB: 2022-11-10
2776 changes to exploits/shellcodes/ghdb
2022-11-10 16:39:50 +00:00

20 lines
No EOL
1 KiB
Text
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

Advisory Name: Local File Inclusion in Phreebooks v2.0
Internal Cybsec Advisory Id:
Vulnerability Class: Local File Inclusion
Release Date: 2010-05-26
Affected Applications: Phreebooks v2.0
Affected Platforms: Any running Phreebooks v2.0
Local / Remote: Remote
Severity: Medium CVSS: 5 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Researcher: Gustavo Sorondo
Vendor Status: N/A
Reference to Vulnerability Disclosure Policy: http://www.cybsec.com/vulnerability_policy.pdf
Vulnerability Description:
A vulnerability has been found in Phreebooks v2.0 which allows malicious people to include local files
by entering special characters in variables used to create file paths. The attackers use “../” sequences to
move up to root directory, thus permitting navigation through the file system.
The files are included into the scripts and its contents executed by the server.
Download:
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13777.pdf (cybsec_advisory_2010_0602_Phreebooks_v2_0_Local_File_Inclusion.pdf)