Multiple PHP remote file inclusion vulnerabilities in Visual Shapers ezContents 2.0.3 allow remote attackers to execute arbitrary PHP code via an empty GLOBALS[rootdp] parameter and an ftps URL in the (1) GLOBALS[admin_home] parameter in (a) diary/event_list.php, (b) gallery/gallery_summary.php, (c) guestbook/showguestbook.php, (d) links/showlinks.php, and (e) reviews/review_summary.php; and the (2) GLOBALS[language_home] parameter in (f) calendar/calendar.php, (g) news/shownews.php, (h) poll/showpoll.php, (i) search/search.php, (j) toprated/toprated.php, and (k) whatsnew/whatsnew.php.
Link | Tags |
---|---|
http://www.osvdb.org/28325 | vdb entry exploit |
http://www.osvdb.org/28330 | vdb entry exploit |
http://www.osvdb.org/28331 | vdb entry exploit |
http://www.osvdb.org/28329 | vdb entry exploit |
http://securityreason.com/securityalert/1479 | third party advisory |
http://securitytracker.com/id?1016770 | vdb entry |
http://www.securityfocus.com/bid/19776 | vdb entry exploit |
http://www.osvdb.org/28327 | vdb entry exploit |
http://www.vupen.com/english/advisories/2006/3420 | vdb entry |
http://www.osvdb.org/28324 | vdb entry exploit |
http://www.osvdb.org/28322 | vdb entry exploit |
http://www.osvdb.org/28321 | vdb entry exploit |
http://www.osvdb.org/28326 | vdb entry exploit |
http://www.osvdb.org/28323 | vdb entry exploit |
http://secunia.com/advisories/21703 | exploit third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/28674 | vdb entry |
http://www.osvdb.org/28328 | vdb entry exploit |
http://www.securityfocus.com/archive/1/444779/100/0/threaded | mailing list |