9 lines
No EOL
495 B
Text
9 lines
No EOL
495 B
Text
source: https://www.securityfocus.com/bid/54334/info
|
|
|
|
sflog! is prone to a local file-include vulnerability because it fails to sufficiently sanitize user-supplied input.
|
|
|
|
An attacker can exploit this vulnerability to view files and execute local scripts in the context of the webserver process. This may aid in further attacks.
|
|
|
|
sflog! 1.00 is vulnerable; other versions may also be affected.
|
|
|
|
http://www.example.com/sflog/index.php?blog=admin§ion=../../../../../../../etc/&permalink=passwd |