The exploit demonstrates a Local File Inclusion (LFI) vulnerability in Angora Guestbook 1.5 by manipulating the 'l' parameter to traverse directories and include arbitrary files, such as 'win.ini'. The PoC URL shows a successful path traversal attack.
Classification
Working Poc 90%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Reliable
Target:Angora Guestbook 1.5
No auth needed
Prerequisites:Access to the target web application