CVE-2008-1624

Jshop Server 1.x-2.x - Remote File Inclusion via xPage Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-1624. PoCs published by v0l4arrra.

AI-analyzed exploit summary This exploit demonstrates a local file inclusion vulnerability in JShop Server 1.x-2.x, allowing arbitrary file reading and potential remote code execution via log poisoning. The PoC includes steps to read sensitive files and inject PHP code into logs for execution.

Description

Directory traversal vulnerability in v2demo/page.php in Jshop Server 1.x through 2.x allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the xPage parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by v0l4arrra · textwebappsphp
https://www.exploit-db.com/exploits/5325

This exploit demonstrates a local file inclusion vulnerability in JShop Server 1.x-2.x, allowing arbitrary file reading and potential remote code execution via log poisoning. The PoC includes steps to read sensitive files and inject PHP code into logs for execution.

Classification
Working Poc 90%
Attack Type
Rce
Complexity
Moderate
Reliability
Reliable
Target: JShop Server 1.x-2.x
No auth needed
Prerequisites: Access to the target web server · Ability to write to server logs
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (3)

Core 3
Core References
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5325
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/28501
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/41524

Scores

EPSS 0.0434
EPSS Percentile 89.0%

Details

CWE
CWE-22
Status published
Products (2)
whorl_ltd/jshop_server 1
whorl_ltd/jshop_server 2
Published Apr 02, 2008
Tracked Since Feb 18, 2026