Directory traversal vulnerability in security.inc.php in AzDGDatingLite 2.1.3, and possibly earlier versions, allows remote attackers to execute arbitrary PHP commands via ".." sequences and "%00" (trailing null byte) characters in the l parameter, which is used in an include_once statement.
Link | Tags |
---|---|
http://securityreason.com/securityalert/5 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/22258 | vdb entry |
http://secunia.com/advisories/16814/ | third party advisory vendor advisory |
http://www.securityfocus.com/bid/14819 | vdb entry exploit |
http://rgod.altervista.org/azdg.html | exploit vendor advisory |
http://marc.info/?l=bugtraq&m=112662698511403&w=2 | mailing list |