Lucene search

K
exploitdb[email protected]EDB-ID:28289
HistoryJul 27, 2006 - 12:00 a.m.

Bosdates 3.x/4.0 - 'Payment.php' Remote File Inclusion

2006-07-2700:00:00
www.exploit-db.com
18

AI Score

7.4

Confidence

Low

EPSS

0.051

Percentile

93.1%

source: https://www.securityfocus.com/bid/19191/info

Bosdates is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input.

An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible.

http://www.example.com/calendar/payment.php?insPath=[evil_script]

AI Score

7.4

Confidence

Low

EPSS

0.051

Percentile

93.1%

Related for EDB-ID:28289