Multiple PHP remote file inclusion vulnerabilities in Yet Another Community System (YACS) CMS 6.6.1 allow remote attackers to execute arbitrary PHP code via a URL in the context[path_to_root] parameter in (1) articles/populate.php, (2) categories/category.php, (3) categories/populate.php, (4) comments/populate.php, (5) files/file.php, (6) sections/section.php, (7) sections/populate.php, (8) tables/populate.php, (9) users/user.php, and (10) users/populate.php. The articles/article.php vector is covered by CVE-2006-4532.
Link | Tags |
---|---|
http://www.osvdb.org/31303 | vdb entry |
http://www.osvdb.org/31304 | vdb entry |
http://www.osvdb.org/31305 | vdb entry |
http://www.osvdb.org/31310 | vdb entry |
http://www.osvdb.org/31306 | vdb entry |
http://www.osvdb.org/31302 | vdb entry |
http://www.osvdb.org/31301 | vdb entry |
http://www.osvdb.org/31307 | vdb entry |
http://www.yetanothercommunitysystem.com/yacs/articles/view.php/1664 | url repurposed patch |
http://www.osvdb.org/31308 | vdb entry |
http://www.osvdb.org/31309 | vdb entry |
http://secunia.com/advisories/21680 | exploit third party advisory patch vendor advisory |