Bugtraq mailing list archives
Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability
From: "Carsten Eilers" <ceilers-lists () gmx de>
Date: Sun, 13 Aug 2006 14:31:44 +0200
sh3ll () sh3ll ir schrieb am Sat, 12 Aug 2006 09:59:20 +0000:
Solution: ~~~~~~~~ Sanitize Variabel $calpath in cal_config.inc.php -------------------------------------
Take a look at the top of cal_config.inc.php: # adjust the '$calpath'. # hardcode it if detection does not work and comment out the remaining code. # # $calpath = "C:\\PHP\\calendarix\\demo\\" ; $calpath = dirname(__FILE__) ; Ups... Regards Carsten -- Dipl.-Inform. Carsten Eilers IT-Sicherheit und Datenschutz <http://www.ceilers-it.de>
Current thread:
- Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability sh3ll (Aug 12)
- Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability Carsten Eilers (Aug 14)
- <Possible follow-ups>
- Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability Steven M. Christey (Aug 14)
- Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability Carsten Eilers (Aug 15)