|Category:||Web application abuses|
|Title:||Golabi CMS 'index_logged.php' Remote File Include Vulnerability|
|Summary:||Determine if Golabi CMS is vulnerable to Remote File Include|
Golabi CMS is prone to a remote file-include vulnerability because
it fails to sufficiently sanitize user-supplied data.
Exploiting this issue can allow an attacker to compromise the
application and the underlying computer
other attacks are also
Upgrade to a newer version available at http://golabicms.sourceforge.net/
BugTraq ID: 33916|
|Copyright||This script is Copyright (C) 2009 Greenbone Networks GmbH|
|This is only one of 52540 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.