Multiple PHP file inclusion vulnerabilities in MySource 2.14.0 allow remote attackers to execute arbitrary PHP code and include arbitrary local files via the (1) INCLUDE_PATH and (2) SQUIZLIB_PATH parameters in new_upgrade_functions.php, (3) the INCLUDE_PATH parameter in init_mysource.php, and the PEAR_PATH parameter in (4) Socket.php, (5) Request.php, (6) Mail.php, (7) Date.php, (8) Span.php, (9) mimeDecode.php, and (10) mime.php.
Link | Tags |
---|---|
http://securityreason.com/securityalert/92 | third party advisory |
http://www.osvdb.org/20039 | vdb entry |
http://www.osvdb.org/20037 | vdb entry |
http://marc.info/?l=bugtraq&m=112966933202769&w=2 | mailing list |
http://www.osvdb.org/20036 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/22772 | vdb entry |
http://secunia.com/advisories/16946/ | patch vendor advisory third party advisory exploit |
http://www.osvdb.org/20040 | vdb entry |
http://www.vupen.com/english/advisories/2005/2132 | vdb entry |
http://www.securityfocus.com/bid/15133/discuss | patch vdb entry exploit |
http://securitytracker.com/id?1015075 | patch vendor advisory vdb entry exploit |
http://www.osvdb.org/20038 | vdb entry |
http://www.osvdb.org/20041 | vdb entry |
http://www.osvdb.org/20035 | vdb entry |
http://www.osvdb.org/20042 | vdb entry |
http://www.osvdb.org/20043 | vdb entry |