PHP remote file inclusion vulnerability in loader.php in PHP System Administration Toolkit (PHPSaTK) allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[config] parameter. NOTE: this issue is disputed by CVE; analysis shows that the GLOBALS[config] variable is initialized before being used
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/446882/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29133 | vdb entry |
http://www.securityfocus.com/archive/1/450936/100/0/threaded | mailing list |
http://www.attrition.org/pipermail/vim/2006-September/001054.html | mailing list |
http://securityreason.com/securityalert/1647 | third party advisory |