The provided text describes a remote file inclusion vulnerability in Ji-takz, where unsanitized input to the 'mycfg' parameter in 'tag.class.php' allows arbitrary remote file execution. No actual exploit code is present, only a description and example URL.
Classification
Writeup 80%
Target:
Ji-takz (version unspecified)
No auth needed
Prerequisites:
Network access to the vulnerable application · Ability to host a malicious file on a remote server