CNVD-2018-13393 Scanner
Detects 'Local File Inclusion' vulnerability in Metinfo.
Short Info
Level
High
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
2 weeks 22 hours
Scan only one
URL
Toolbox
-
Metinfo is a widely used content management system designed for building and managing websites. It is employed by developers and companies to facilitate easy management of web content and is favored for its user-friendly interface and extensive plugin support. The system is particularly popular in small to medium-sized enterprises looking for an efficient web solution. Metinfo is utilized for its robust functionality and ability to be customized according to specific needs. Users depend on its comprehensive set of features to ensure their online presence is stable and responsive. The platform supports various web functionalities to accommodate complex website requirements.
The Local File Inclusion vulnerability allows attackers to exploit the application by including 'local' files on the server. This type of vulnerability can lead to unauthorized access and manipulation of sensitive files within the server's directory structure. Attackers might leverage this vulnerability to gain access to configuration files or execute arbitrary code. The risk arises from improperly validated user input that governs which files are accessed. The LFI vulnerability is critical as it significantly undermines the security integrity of the application. Exploiting an LFI vulnerability requires minimal effort from attackers but can have far-reaching consequences on server security.
In technical terms, the vulnerability resides in the application’s failure to properly sanitize user input. This often occurs in dynamic scripts where paths to file resources are constructed based on user-supplied information. In the case of Metinfo, the vulnerability is triggered when a GET request is sent to the 'thumb.php' file with a malicious path sequence. The LFI vulnerability is highly dangerous as it may expose scripts like admin login checks that are critical to the application’s authentication process. Such exposure can be used to reveal sensitive server-side scripts and details to the attacker.
When exploited, this vulnerability may lead to unauthorized access to private files and, potentially, escalate into a full compromise of the server. Attackers could extract confidential data, tamper with application functionalities, or manipulate user sessions. The consequences of such an exploitation include data breaches, loss of sensitive information, and a significant decrease in overall application trust. These attacks also risk violating data protection regulations and privacy laws, which may lead to legal ramifications. Organizations need to be aware of the potential for LFI vulnerabilities to expand into broader, more damaging cyber attacks.
REFERENCES