The provided text describes a local file inclusion vulnerability in Ajaxmint Gallery 1.0, where insufficient input sanitization allows an attacker to traverse directories and potentially execute local scripts. The example URL demonstrates directory traversal to access a file outside the intended directory.
Classification
Writeup 80%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Theoretical
Target:Ajaxmint Gallery 1.0
No auth needed
Prerequisites:Access to the vulnerable web application