# Simpnews <= All version - Remote File Include Vulnerabilities
# require_once($path_simpnews.'/langchk.php');
# include_once('./language/lang_'.$act_lang.'.php');
# require_once('./includes/get_settings.inc');
# require_once('./includes/wap_get_settings.inc');
# Vulnerable : # http://www.victim.com/Simpnews/wap_short_news.php?path_simpnews=Command-Shell
Was this verified on a running site or was this just source inspected?
The below shouldn't be vulnerable with config.php declaring $path_simpnews.
CODE
--------------------------------------
require_once('./config.php');
require_once('./functions.php');
if(!isset($category))
$category=0;
require_once($path_simpnews.'/langchk.php');
include_once('./language/lang_'.$act_lang.'.php');
require_once('./includes/get_settings.inc');
require_once('./includes/wap_get_settings.inc');
config.php
--------------------------------------
$path_simpnews = getenv("DOCUMENT_ROOT")."/simpnews";
/str0ke