Vulnerabilities > CVE-2007-3096 - Local File Include vulnerability in PBLang

047910
CVSS 6.8 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
pblang
nessus
exploit available

Summary

Directory traversal vulnerability in login.php in PBLang (PBL) 4.67.16.a and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter. Successful exploitation with arbitrary file extensions requires that "magic_quotes_gpc" is disabled.

Vulnerable Configurations

Part Description Count
Application
Pblang
1

Exploit-Db

descriptionPBLang <= 4.67.16.a Remote Code Execution Exploit. CVE-2007-3096. Webapps exploit for php platform
fileexploits/php/webapps/4036.php
idEDB-ID:4036
last seen2016-01-31
modified2007-06-06
platformphp
port
published2007-06-06
reporterSilentz
sourcehttps://www.exploit-db.com/download/4036/
titlePBLang <= 4.67.16.a Remote Code Execution Exploit
typewebapps

Nessus

NASL familyCGI abuses
NASL idPBLANG_LANG_FILE_INCLUDE.NASL
descriptionThe remote host is running PBLang, a bulletin board system that uses flat files and is written in PHP. The version of PBLang installed on the remote host fails to sanitize user input to the
last seen2020-06-01
modified2020-06-02
plugin id25444
published2007-06-07
reporterThis script is Copyright (C) 2007-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/25444
titlePBLang login.php lang Parameter Local File Inclusion