Directory traversal vulnerability in kgcall.php in KGB 1.87 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the engine parameter, as demonstrated by uploading a file containing PHP code with an image/jpeg content type, and then referencing this file through the engine parameter.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/20258 | vdb entry exploit |
http://secunia.com/advisories/22152 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29235 | vdb entry |
https://www.exploit-db.com/exploits/2447 | exploit |
http://www.vupen.com/english/advisories/2006/3844 | vdb entry |