exploit-db-mirror/platforms/php/webapps/30961.txt
Offensive Security e14c52c119 Updated 01_17_2014
2014-01-17 04:18:08 +00:00

9 lines
No EOL
482 B
Text
Executable file

source: http://www.securityfocus.com/bid/27075/info
Kontakt Formular is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.
Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.
This issue affects Kontakt Formular 1.4; other versions may be vulnerable as well.
http://www.example.com/[path]/includes/function.php?root_path=[Shellcode]