PHP remote file include vulnerability in plog-admin-functions.php in Plogger Beta 2 allows remote attackers to execute arbitrary code via a URL in the config[basedir] parameter.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/23861 | vdb entry |
http://freeconnects.webcindario.com/index.php?option=com_content&task=view&id=41&Itemid=1 | |
http://securitytracker.com/id?1015380 | exploit vdb entry patch |
http://www.osvdb.org/22395 | vdb entry |
http://masendav.com/~duke/PloggerChanges_files/FileComparisonReport1.html | |
http://securityreason.com/securityalert/273 | third party advisory |
http://www.securityfocus.com/bid/15992 | exploit vdb entry patch |
http://www.plogger.org/two-point-one/ | patch |