The code describes a remote file inclusion vulnerability in Quickblogger 1.4 due to improper input sanitization in the 'page' parameter of acc.php. An attacker can exploit this to execute arbitrary server-side script code with webserver privileges.
Classification
Writeup 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target:Quickblogger version 1.4
No auth needed
Prerequisites:Access to the target web application · Ability to host a malicious file on an external server