Multiple PHP remote file inclusion vulnerabilities in myWebland myEvent 1.2 allow remote attackers to execute arbitrary PHP code via a URL in the myevent_path parameter in (1) event.php and (2) initialize.php. NOTE: vector 2 was later reported to affect 1.4 as well.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/17575 | vdb entry exploit |
http://secunia.com/advisories/19680 | third party advisory |
http://securityreason.com/securityalert/767 | third party advisory |
http://securitytracker.com/id?1016616 | vdb entry |
http://securityreason.com/securityalert/726 | third party advisory |
http://www.securityfocus.com/archive/1/431125/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/28347 | vdb entry |
http://www.osvdb.org/24722 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25882 | vdb entry |
http://www.vupen.com/english/advisories/2006/1384 | vdb entry vendor advisory |
http://www.osvdb.org/24723 | vdb entry |