|
[an error occurred while processing this directive]
|
|
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <200811011047.mA1AlUrD012726@www5.securityfocus.com>
Date: Sat, 1 Nov 2008 04:47:30 -0600
From: joseph.giron13@...il.com
To: bugtraq@...urityfocus.com
Subject: sharedlog CMS Remote File Includes
I have discovered a remote file include vulnerability in the sharedlog Content management system.
http://www.shatm.com/
http://sourceforge.net/projects/sharedlog/
Vulnerable code segment:
require_once($GLOBALS['root_dir'].'classes/!class.memcache.inc.php');
Line 5 of slideshow_uploadvideo.content.php
As usual,Successful exploitation requires that "register_globals" is enabled.
Happy hacking.
Powered by blists - more mailing lists