PHP remote file inclusion vulnerability in enduser/listmessenger.php in ListMessenger 0.9.3 allows remote attackers to execute arbitrary PHP code via a URL in the lm_path parameter. NOTE: the vendor has disputed this issue to SecurityTracker, stating that the $lm_path variable is set to a constant value. As of 20060726, CVE concurs with the vendor based on SecurityTracker's post-disclosure analysis
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/440291/100/0/threaded | mailing list |
http://securityreason.com/securityalert/1243 | third party advisory |
http://www.securityfocus.com/bid/19014 | vdb entry exploit |
http://www.attrition.org/pipermail/vim/2006-July/000946.html | mailing list |
http://www.osvdb.org/28289 | vdb entry |
http://securitytracker.com/id?1016530 | vdb entry |