Multiple PHP remote file inclusion vulnerabilities in Redaction System 1.0000 allow remote attackers to execute arbitrary PHP code via a URL in the (1) lang_prefix parameter to (a) conn.php, (b) sesscheck.php, (c) wap/conn.php, or (d) wap/sesscheck.php, or the (2) lang parameter to (e) index.php.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.osvdb.org/29704 | vdb entry |
https://www.exploit-db.com/exploits/2534 | exploit |
http://secunia.com/advisories/22347 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29504 | vdb entry |
http://www.osvdb.org/29700 | vdb entry |
http://www.osvdb.org/29702 | vdb entry |
http://www.vupen.com/english/advisories/2006/4024 | vdb entry vendor advisory |
http://www.osvdb.org/29703 | vdb entry |
http://www.securityfocus.com/bid/20499 | vdb entry |
http://redactionsystem.sourceforge.net/index.php?m=news&id=5 | |
http://www.osvdb.org/29701 | vdb entry |
http://redactionsystem.sourceforge.net/index.php?m=news&id=2 |