Researcher: Mahmood_ali
Ref: http://www.milw0rm.com/exploits/3999
from common.css.php:
if( isset( $_REQUEST[ 'skin' ] ) )
{
$skin = $_REQUEST[ 'skin' ];
}
...
@readfile( $skin . '.css' );
Presumably, the exploit URL given in the milw0rm item would need a
trailing %00 byte.
- Steve