ipchat.php in Invision Power Board 1.1.1 allows remote attackers to execute arbitrary PHP code, if register_globals is enabled, by modifying the root_path parameter to reference a URL on a remote web server that contains the code.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://secunia.com/advisories/8182 | third party advisory |
http://www.osvdb.org/3357 | vdb entry |
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0099.html | vendor advisory mailing list exploit |
http://www.securityfocus.com/bid/6976 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/11435 | vdb entry |