PHP remote file inclusion vulnerability in openi-admin/base/fileloader.php in OPENi-CMS 1.0.1, and possibly earlier, allows remote attackers to execute arbitrary PHP code via a URL in the config[openi_dir] parameter.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2006/3556 | vdb entry |
https://www.exploit-db.com/exploits/2344 | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/28859 | vdb entry |
http://www.securityfocus.com/bid/19952 | vdb entry exploit |
http://bb.domaindlx.com/bingung/shellcore/advisories.asp?bug_report=display&infamous_group=103 | vendor advisory exploit |
http://secunia.com/advisories/21874 | vendor advisory third party advisory exploit |