"

vulnerability Path :


vuln code in [localhost]/wikepage/index.php


Sample Of vulnerabil Line : $ templatefile=$_GET['template']; (Line 586) And 
More .....

"


Fake advisory:



// load page content

function showpage($file) {

        global $pagevars, $wiki_get, $langu;

        // load file

        $raw=implode("", file($file) );

        // load menu

        $raw2=implode("", file('data/'.$langu.'_menu.txt') );

        // filter!

        $image=$_GET['image'];

        secure($image);

        if ($image){

        $raw="[".$image."]";

        }

        $content=filter( $raw ) . $content;

        $menucontent=filter( $raw2 ) . $menucontent;

        // load template

        // Checks Query string for Template variable, and uses specified 
template or defaults to index.html

        $templatefile=$_GET['template'];

        if($templatefile=="")

                $templatefile="index.html";

        $template=implode( "", 
file('theme/'.$pagevars["theme"].'/'.$templatefile) );

        $whole=str_replace("<!--wikicontent-->",$content,$template);

        $whole=str_replace("<!--menucontent-->",$menucontent,$whole);

        output( $whole, $file );

}


function editpage($file) {

Reply via email to