exploit-db-mirror/platforms/php/webapps/34139.txt
Offensive Security 857d210af1 Updated 07_24_2014
2014-07-24 04:40:20 +00:00

9 lines
No EOL
539 B
Text
Executable file

source: http://www.securityfocus.com/bid/40834/info
Yamamah Photo Gallery is prone to a local file-disclosure vulnerability because it fails to adequately validate user-supplied input.
An attacker can exploit this vulnerability to obtain potentially sensitive information from local files on computers running the vulnerable application. This may aid in further attacks.
Yamamah 1.00 is vulnerable; other versions may also be affected.
http://www.example.com/themes/default/download.php?dfownload=../../includes/config.inc.php