Multiple PHP remote file inclusion vulnerabilities in F@cile Interactive Web 0.8.5 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) pathfile parameter in (a) p-editpage.php and (b) p-editbox.php, and the (2) mytheme and (3) myskin parameters in multiple "p-themes" index.inc.php files including (c) lowgraphic, (d) classic, (e) puzzle, (f) simple, and (g) ciao.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/435283/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26854 | vdb entry |
http://www.nukedx.com/?viewdoc=35 | vendor advisory exploit |
http://www.vupen.com/english/advisories/2006/2036 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26841 | vdb entry |
http://www.nukedx.com/?getxpl=35 | exploit |
http://www.osvdb.org/26101 | vdb entry |
http://www.osvdb.org/26103 | vdb entry |
http://www.securityfocus.com/bid/18149 | vdb entry exploit |
http://www.osvdb.org/26102 | vdb entry |
http://secunia.com/advisories/20358 | vendor advisory third party advisory exploit |
http://securityreason.com/securityalert/1010 | third party advisory |