BugTraq
Back to list
|
Post reply
Re: [MajorSecurity #8]DreamAccount <= 3.1 - Remote File Include Vulnerability
Jun 06 2006 03:10PM
admin majorsecurity de
Please update my advisory.
After posting up my advisory I have seen that 2 other php-files are also affected by this vulnerability.
Input passed to the "da_path" parameter in "auth.cookie.inc.php", "auth.header.inc.php" and
"auth.sessions.inc.php" is not properly verified, before it is used to include files.
This can be exploited to execute arbitrary code by including files from external resources.
You can see the updated advisory here:
http://majorsecurity.de/advisory/major_rls8.txt
Greetings,
David Vieira-Kurz
[ reply ]
Privacy Statement
Copyright 2010, SecurityFocus
After posting up my advisory I have seen that 2 other php-files are also affected by this vulnerability.
Input passed to the "da_path" parameter in "auth.cookie.inc.php", "auth.header.inc.php" and
"auth.sessions.inc.php" is not properly verified, before it is used to include files.
This can be exploited to execute arbitrary code by including files from external resources.
You can see the updated advisory here:
http://majorsecurity.de/advisory/major_rls8.txt
Greetings,
David Vieira-Kurz
[ reply ]