9 lines
No EOL
551 B
Text
9 lines
No EOL
551 B
Text
source: https://www.securityfocus.com/bid/53659/info
|
|
|
|
Ajaxmint Gallery is prone to a local file-include vulnerability because it fails to sufficiently sanitize user-supplied input.
|
|
|
|
An attacker can exploit this vulnerability to view files and to execute local scripts in the context of the webserver process. This may aid in further attacks.
|
|
|
|
Ajaxmint Gallery 1.0 is vulnerable; other versions may also be affected.
|
|
|
|
http://www.example.com/learn/ajaxmint/ajaxmint-gallery/admin/index.php?c=..\..\..\..\ajaxmint-gallery/pictures/5_me.jpg%00 [aka shell] |