The exploit demonstrates a remote file inclusion vulnerability in FSphp 0.2.1 by manipulating the FSPHP_LIB parameter in multiple PHP files. This allows an attacker to include arbitrary remote files, potentially leading to remote code execution.
Classification
Working Poc 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:FSphp version 0.2.1
No auth needed
Prerequisites:Network access to the target application · Ability to host malicious PHP code on a remote server