exploit-db-mirror/platforms/php/webapps/22671.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

7 lines
No EOL
436 B
Text
Executable file

source: http://www.securityfocus.com/bid/7737/info
Shoutbox is prone to directory traversal attacks. The vulnerability exists due to insufficient sanitization of user-supplied values to URI parameters.
An attacker can exploit this vulnerability by manipulating the value of the affected 'conf' URI parameter to obtain any files readable by the web server.
http://blablabla.com/shoutbox.php?conf=../../../../../../../etc/passwd