Exploit openSIS 5.1 - 'ajax.php' Local File Inclusion

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
38039
Проверка EDB
  1. Пройдено
Автор
JULIAN HOROSZKIEWICZ
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2012-11-20
openSIS 5.1 - 'ajax.php' Local File Inclusion
Код:
source: https://www.securityfocus.com/bid/56598/info

openSIS is prone to a local file-include vulnerability because it fails to sufficiently sanitize user-supplied data.

An attacker can exploit this vulnerability to obtain potentially sensitive information and execute arbitrary local scripts in the context of the Web server process. This may allow the attacker to compromise the application and computer; other attacks are also possible.

openSIS 5.1 is vulnerable; other versions may also be affected.

http://www.example.com/opensis5.1/opensis/ajax.php?modname=misc/../../../../../../../../../../../../../etc/passwd&bypass=Transcripts.php
 
Источник
www.exploit-db.com

Похожие темы