This is a writeup describing a Remote File Inclusion (RFI) vulnerability in Golabi CMS version 1.0. The vulnerability arises from an unhandled variable inclusion in the default template file, allowing remote attackers to include malicious files via the 'cur_module' parameter.
Classification
Writeup 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:Golabi CMS 1.0
No auth needed
Prerequisites:register_globals must be enabled on the target server