Directory traversal vulnerability in include/head_chat.inc.php in php Help Agent 1.0 and 1.1 Full allows remote malicious users to include and execute arbitrary local files via a .. (dot dot) in the content parameter. NOTE: in some environments, this can be leveraged for remote file inclusion by using a UNC share pathname or an ftp, ftps, or ssh2.sftp URL.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linuxwebshop php help agent 1.0 |
||
linuxwebshop php help agent 1.1 |