source: http://www.securityfocus.com/bid/28401/info ooComments is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible. ooComments 1.0 is vulnerable; other versions may also be affected. http://www.example.com/classes/class_admin.php?PathToComment=ZoRLu.txt?
Related ExploitsTrying to match CVEs (1): CVE-2008-1511
Trying to match OSVDBs (1): 43802
Other Possible E-DB Search Terms: ooComments 1.0, ooComments
|2008-03-22||ooComments 1.0 - classes/class_comments.php PathToComment Parameter Remote File Inclusion||ZoRLu|