ASCET Interactive Huski CMS 'i' Parameter Local File Include Vulnerability

An attacker can exploit this issue via a browser.

The following example URI is available:

http://www.example.com/size.php?i=index.php

Proof-of-concept code is also available:


 

Privacy Statement
Copyright 2010, SecurityFocus