php_api.php in phpWebNotes 2.0.0 uses the extract function to modify key variables such as $t_path_core, which leads to a PHP file inclusion vulnerability that allows remote attackers to execute arbitrary PHP code via the t_path_core parameter.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/14679 | vdb entry exploit |
http://www.securitytracker.com/alerts/2005/Aug/1014807.html | vdb entry exploit |
http://marc.info/?l=bugtraq&m=112516693300371&w=2 | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/22040 | vdb entry |