PHP remote file inclusion vulnerability in nucleus/libs/PLUGINADMIN.php in Nucleus 3.22 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[DIR_LIBS] parameter.
Link | Tags |
---|---|
http://secunia.com/advisories/20219 | third party advisory patch vendor advisory |
http://securityreason.com/securityalert/951 | third party advisory |
http://www.nucleuscms.org/item/3038 | |
http://www.securityfocus.com/archive/1/434837/100/0/threaded | mailing list |
http://retrogod.altervista.org/nucleus_322_incl_xpl.html | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26606 | vdb entry |
http://securitytracker.com/id?1016146 | vdb entry |
http://www.vupen.com/english/advisories/2006/1936 | vdb entry |
http://www.securityfocus.com/bid/18097 | vdb entry |
http://forum.nucleuscms.org/viewtopic.php?t=12304 | |
http://www.osvdb.org/25749 | vdb entry |