No description provided by source.
source: http://www.securityfocus.com/bid/28861/info Aterr is prone to local file-include vulnerabilities because it fails to properly sanitize user-supplied input. An attacker can exploit these vulnerabilities using directory-traversal strings to view files and execute local scripts in the context of the webserver process. This may aid in further attacks. The issues affect Aterr 0.9.1; other versions might also be affected. http://www.example.com/path/include/functions.inc.php?class=[Local File] http://www.example.com/path/include/common.inc.php?file=[Local File]