Multiple PHP remote file inclusion vulnerabilities in USOLVED NEWSolved Lite 1.9.2, and possibly earlier, allow remote attackers to execute arbitrary PHP code via a URL in the abs_path parameter to (1) newsscript_lyt.php, (2) newsticker/newsscript_get.php, (3) inc/output/news_theme1.php, (4) inc/output/news_theme2.php, or (5) inc/output/news_theme3.php.
Link | Tags |
---|---|
http://www.osvdb.org/27839 | vdb entry |
http://www.bb-pcsecurity.de/sicherheit_286.htm | exploit patch vendor advisory |
http://securityreason.com/securityalert/1366 | third party advisory |
http://secunia.com/advisories/21395 | third party advisory vendor advisory |
http://www.osvdb.org/27840 | vdb entry |
http://www.osvdb.org/27836 | vdb entry |
https://www.exploit-db.com/exploits/2135 | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/28262 | vdb entry |
http://www.securityfocus.com/bid/19379 | vdb entry patch |
http://www.vupen.com/english/advisories/2006/3200 | vdb entry |
http://www.osvdb.org/27837 | vdb entry |
http://www.osvdb.org/27838 | vdb entry |
http://www.securityfocus.com/archive/1/442434/100/0/threaded | mailing list |
http://www.usolved.net/site/index.php | patch |