exploit-db-mirror/platforms/php/local/27334.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

5 lines
No EOL
380 B
Text
Executable file

source: http://www.securityfocus.com/bid/16878/info
PHP is prone to multiple input-validation vulnerabilities that could allow 'safe_mode' and 'open_basedir' security settings to be bypassed. These issues reside in the 'mb_send_mail()' function, the 'mail()' function, and various PHP IMAP functions.
$additional_param = "-C ".$file_to_read." -X ".getcwd()."/".$output_file;