Advertisement






Update : DreamAccount <= 3.1 - Remote File Include Vulnerability

CVE Category Price Severity
Author Risk Exploitation Type Date
Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006060068

Below is a copy:

Please update my advisory.

After posting up my advisory I have seen that 2 other php-files are also affected by this vulnerability.

Input passed to the "da_path" parameter in "auth.cookie.inc.php", "auth.header.inc.php" and

"auth.sessions.inc.php" is not properly verified, before it is used to include files.

This can be exploited to execute arbitrary code by including files from external resources.

You can see the updated advisory here:

http://majorsecurity.de/advisory/major_rls8.txt

Greetings,

David Vieira-Kurz

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum