Ams has discovered a vulnerability in fuzzylime, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system.
Input passed to the "p" parameter in rss.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local resources.
Successful exploitation requires that "magic_quotes_gpc" is disabled.
NOTE: The vulnerability can be exploited to execute arbitrary PHP code by including the code/content.php script.
The vulnerability is confirmed in version 3.01a. Other versions may also be affected.
Monday, July 7, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment