Lucene search

K
exploitdbMoudiEDB-ID:34793
HistoryJul 13, 2009 - 12:00 a.m.

Top Paidmailer - 'home.php' Remote File Inclusion

2009-07-1300:00:00
Moudi
www.exploit-db.com
14

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/43626/info

Top Paidmailer is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input.

An attacker can exploit this vulnerability to obtain potentially sensitive information or to execute arbitrary script code in the context of the webserver process. This may allow the attacker to compromise the application and the computer; other attacks are also possible. 

http://www.example.com/patch/home.php?page=[rfi] 

AI Score

7.4

Confidence

Low

Related for EDB-ID:34793