PHP remote file inclusion vulnerability in main.inc in KorWeblog 1.6.2-cvs and earlier allows remote attackers to execute arbitrary PHP code by modifying the G_PATH parameter to reference a URL on a remote web server that contains the code, as demonstrated in index.php when using .. (dot dot) sequences in the lng parameter to cause main.inc to be loaded.
Link | Tags |
---|---|
http://marc.info/?l=bugtraq&m=110442847614890&w=2 | mailing list |
http://www.securityfocus.com/bid/12132 | vdb entry exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18717 | vdb entry |
http://secunia.com/advisories/13700 | third party advisory |