RadScripts - 'a_editpage.php?Filename' Arbitrary File Overwrite

Author: INVENT
type: webapps
platform: php
port: 
date_added: 2006-07-24  
date_updated: 2013-09-13  
verified: 1  
codes: OSVDB-29406  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 28261.txt  
source: https://www.securityfocus.com/bid/19128/info

Multiple Rad Scripts products are prone to an authentication-bypass vulnerability. These issues occur because the applications fail to prevent an attacker from accessing admin scripts directly without requiring authentication.

A remote attacker can exploit these issues to perform administrative functions without requiring authentication. For example, the attacker may be able to overwrite existing files on the vulnerable computer in the context of the webserver process.

http://target.xxx/[product_home]/admin/a_editpage.php?filename=[arbitrary_file]