J-Security Center

Title: Galaxy Scripts Mini File Host 'upload.php' POST Parameter Local File Include Vulnerability

Severity: HIGH


Galaxy Scripts Mini File Host is a file-hosting script implemented in PHP.

The application is prone to a local file-include vulnerability because it fails to sufficiently sanitize user-supplied input to the 'language' parameter of the 'upload.php' script when handling POST requests.

NOTE: This vulnerability affects the same file and parameter as the issue described in BID 27327. The vulnerability has been partially fixed, but an attacker could still exploit the issue by submitting a specially crafted POST request.

Attackers can exploit this issue to execute arbitrary server-side scripts and retrieve potentially sensitive information.

This issue affects Mini File Host 1.2.1 and prior versions.

Affected Products:

  • Galaxyscripts Mini File Host 1.2
  • Galaxyscripts Mini File Host 1.2.1


Juniper Networks provides this content via a wide variety of sources and production methods. If notified of errors or omissions in the content of this page, Juniper Networks, at its discretion, will modify or remove the page or leave the content as is, depending on various factors including but not limited to the reputation and authority of the party providing the notification. Please use the contact information displayed elsewhere on this page to report any errors or omissions regarding the content on this page.