BugTraq
Back to list
|
Post reply
Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability
Aug 12 2006 09:59AM
sh3ll sh3ll ir
(1 replies)
Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability
Aug 13 2006 12:31PM
Carsten Eilers (ceilers-lists gmx de)
sh3ll (at) sh3ll (dot) ir [email concealed] schrieb am Sat, 12 Aug 2006 09:59:20 +0000:
>
>Solution:
>
>~~~~~~~~
>
>Sanitize Variabel $calpath in cal_config.inc.php
>
>-------------------------------------
Take a look at the top of cal_config.inc.php:
# adjust the '$calpath'.
# hardcode it if detection does not work and comment out the remaining code.
#
# $calpath = "C:\\PHP\\calendarix\\demo\\" ;
$calpath = dirname(__FILE__) ;
Ups...
Regards
Carsten
--
Dipl.-Inform. Carsten Eilers
IT-Sicherheit und Datenschutz
<http://www.ceilers-it.de>
[ reply ]
Privacy Statement
Copyright 2010, SecurityFocus
>
>Solution:
>
>~~~~~~~~
>
>Sanitize Variabel $calpath in cal_config.inc.php
>
>-------------------------------------
Take a look at the top of cal_config.inc.php:
# adjust the '$calpath'.
# hardcode it if detection does not work and comment out the remaining code.
#
# $calpath = "C:\\PHP\\calendarix\\demo\\" ;
$calpath = dirname(__FILE__) ;
Ups...
Regards
Carsten
--
Dipl.-Inform. Carsten Eilers
IT-Sicherheit und Datenschutz
<http://www.ceilers-it.de>
[ reply ]