Zeroboard 4.1, when the "allow_url_fopen" and "register_globals" variables are enabled, allows remote attackers to execute arbitrary PHP code by modifying the _zb_path parameter to reference a URL on a remote web server that contains the code.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/5028 | vdb entry exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/9366 | vdb entry |
http://online.securityfocus.com/archive/1/277126 | mailing list |