PHP file inclusion vulnerability in includes/edit_new.php in Pivot 1.30 RC2 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a FTP URL or full file path in the Paths[extensions_path] parameter.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/439495/100/0/threaded | mailing list |
http://retrogod.altervista.org/pivot_130RC2_xpl.html | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27679 | vdb entry |
http://secunia.com/advisories/20962 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/18881 | vdb entry exploit |
http://securityreason.com/securityalert/1214 | third party advisory |
http://www.osvdb.org/27512 | vdb entry |