exploitdb
WORKING POC
VERIFIED
by K-159 · textwebappsphp
https://www.exploit-db.com/exploits/29579
The exploit demonstrates a remote file inclusion vulnerability in TagIt! TagBoard by manipulating the 'configpath' and 'adminpath' parameters in 'tag_process.php'. An attacker can include arbitrary remote files, potentially leading to remote code execution.
Classification
Working Poc 90%
Target:
TagIt! TagBoard 2.1.b Build 2 and prior
No auth needed
Prerequisites:
Network access to the vulnerable application · Ability to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by K-159 · textwebappsphp
https://www.exploit-db.com/exploits/29578
The exploit demonstrates a remote file inclusion vulnerability in TagIt! TagBoard due to insufficient sanitization of user-supplied input in the 'configpath' and 'adminpath' parameters. An attacker can include and execute arbitrary remote files, potentially leading to remote code execution.
Classification
Working Poc 90%
Target:
TagIt! TagBoard 2.1.b Build 2 and prior
No auth needed
Prerequisites:
Access to the vulnerable TagIt! TagBoard application · Ability to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by K-159 · textwebappsphp
https://www.exploit-db.com/exploits/29593
The exploit demonstrates a remote file inclusion vulnerability in TagIt! TagBoard by injecting a malicious URL into the 'admin' parameter of wordfilter.php. This allows an attacker to include and execute arbitrary remote code due to insufficient input sanitization.
Classification
Working Poc 90%
Target:
TagIt! TagBoard 2.1.b Build 2 and prior
No auth needed
Prerequisites:
Network access to the target application · Ability to host malicious code on a remote server
exploitdb
WORKING POC
VERIFIED
by K-159 · textwebappsphp
https://www.exploit-db.com/exploits/29588
The exploit demonstrates a remote file inclusion vulnerability in TagIt! TagBoard by injecting a malicious URL into the 'configpath' parameter of verify.php. This allows an attacker to execute arbitrary code by including a remote file.
Classification
Working Poc 90%
Target:
TagIt! TagBoard 2.1.b Build 2 and prior
No auth needed
Prerequisites:
Network access to the target application · Ability to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by K-159 · textwebappsphp
https://www.exploit-db.com/exploits/29592
The exploit demonstrates a remote file inclusion vulnerability in TagIt! TagBoard by manipulating the 'admin' parameter in updatefilter.php to include arbitrary remote files. This allows an attacker to execute malicious code on the target system.
Classification
Working Poc 90%
Target:
TagIt! TagBoard 2.1.b Build 2 and prior
No auth needed
Prerequisites:
Network access to the target application · Ability to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by K-159 · textwebappsphp
https://www.exploit-db.com/exploits/29591
The exploit demonstrates a remote file inclusion vulnerability in TagIt! TagBoard by manipulating the 'admin' parameter in updateconf.php to include arbitrary remote files. This allows an attacker to execute malicious code on the target system.
Classification
Working Poc 90%
Target:
TagIt! TagBoard 2.1.b Build 2 and prior
No auth needed
Prerequisites:
Remote file inclusion must be enabled on the target server · Attacker must be able to host a malicious file on an accessible server
exploitdb
WORKING POC
VERIFIED
by K-159 · textwebappsphp
https://www.exploit-db.com/exploits/29590
The exploit demonstrates a remote file inclusion vulnerability in TagIt! TagBoard by manipulating the 'admin' parameter in readconf.php to include arbitrary remote files. This allows an attacker to execute malicious code on the target system.
Classification
Working Poc 90%
Target:
TagIt! TagBoard 2.1.b Build 2 and prior
No auth needed
Prerequisites:
Network access to the target application · Ability to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by K-159 · textwebappsphp
https://www.exploit-db.com/exploits/29587
The exploit demonstrates a remote file inclusion vulnerability in TagIt! TagBoard due to insufficient sanitization of user-supplied data in the 'configpath' parameter. An attacker can include and execute arbitrary remote files, potentially leading to remote code execution.
Classification
Working Poc 90%
Target:
TagIt! TagBoard 2.1.b Build 2 and prior
No auth needed
Prerequisites:
Access to the vulnerable endpoint · Remote file hosting location
exploitdb
WORKING POC
VERIFIED
by K-159 · textwebappsphp
https://www.exploit-db.com/exploits/29589
The exploit demonstrates a remote file inclusion vulnerability in TagIt! TagBoard by manipulating the 'adminpath' parameter in the URL to include a remote file. This allows an attacker to execute arbitrary code on the target system.
Classification
Working Poc 90%
Target:
TagIt! TagBoard 2.1.b Build 2 and prior versions
No auth needed
Prerequisites:
Access to the target URL · Remote file hosting location
exploitdb
WORKING POC
VERIFIED
by K-159 · textwebappsphp
https://www.exploit-db.com/exploits/29585
The exploit demonstrates a remote file inclusion vulnerability in TagIt! TagBoard by manipulating the 'configpath' parameter in 'editTagmin.php' to include a remote file. This allows an attacker to execute arbitrary code on the target system.
Classification
Working Poc 90%
Target:
TagIt! TagBoard 2.1.b Build 2 and prior
No auth needed
Prerequisites:
Remote file hosting location · Network access to the target
exploitdb
WORKING POC
VERIFIED
by K-159 · textwebappsphp
https://www.exploit-db.com/exploits/29586
The exploit demonstrates a remote file inclusion vulnerability in TagIt! TagBoard by manipulating the 'configpath' parameter in 'editTag.php' to include a remote file. This allows an attacker to execute arbitrary code on the target system.
Classification
Working Poc 90%
Target:
TagIt! TagBoard 2.1.b Build 2 and prior
No auth needed
Prerequisites:
Remote file hosting location
exploitdb
WORKING POC
VERIFIED
by K-159 · textwebappsphp
https://www.exploit-db.com/exploits/29583
The exploit demonstrates a remote file inclusion vulnerability in TagIt! TagBoard by injecting a malicious URL into the 'configpath' parameter of 'delTagmin.php'. This allows an attacker to execute arbitrary code by including a remote file.
Classification
Working Poc 90%
Target:
TagIt! TagBoard 2.1.b Build 2 and prior versions
No auth needed
Prerequisites:
Access to the target web application · Ability to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by K-159 · textwebappsphp
https://www.exploit-db.com/exploits/29584
The exploit demonstrates a remote file inclusion vulnerability in TagIt! TagBoard by manipulating the 'configpath' parameter in 'delTag.php' to include a remote file. This allows an attacker to execute arbitrary code on the target system.
Classification
Working Poc 90%
Target:
TagIt! TagBoard 2.1.b Build 2 and prior
No auth needed
Prerequisites:
Network access to the target application · Ability to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by K-159 · textwebappsphp
https://www.exploit-db.com/exploits/29582
The exploit demonstrates a remote file inclusion vulnerability in TagIt! TagBoard by injecting a malicious URL into the 'configpath' parameter of 'ban_watch.phpp'. This allows an attacker to execute arbitrary code by including a remote file.
Classification
Working Poc 90%
Target:
TagIt! TagBoard 2.1.b Build 2 and prior versions
No auth needed
Prerequisites:
Access to the vulnerable endpoint · Ability to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by K-159 · textwebappsphp
https://www.exploit-db.com/exploits/29581
The exploit demonstrates a remote file inclusion vulnerability in TagIt! TagBoard by manipulating the 'configpath' parameter to include a remote file. This allows an attacker to execute arbitrary code on the target system.
Classification
Working Poc 90%
Target:
TagIt! TagBoard 2.1.b Build 2 and prior
No auth needed
Prerequisites:
Network access to the target application · Ability to host a malicious file on a remote server
exploitdb
WORKING POC
VERIFIED
by K-159 · textwebappsphp
https://www.exploit-db.com/exploits/29580
The exploit demonstrates a remote file inclusion vulnerability in TagIt! TagBoard due to insufficient sanitization of user-supplied data in the 'configpath' parameter. An attacker can include and execute arbitrary remote files, potentially leading to remote code execution.
Classification
Working Poc 90%
Target:
TagIt! TagBoard 2.1.b Build 2 and prior
No auth needed
Prerequisites:
Access to the vulnerable endpoint · Ability to host a malicious file on a remote server