Multiple PHP remote file inclusion vulnerabilities in Christopher Fowler (Rhode Island) RSSonate allow remote attackers to execute arbitrary PHP code via a URL in the PROJECT_ROOT parameter to (1) xml2rss.php, (2) config_local.php, (3) rssonate.php, and (4) sql2xml.php in Src/getFeed/inc/.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/2605 | exploit |
http://www.vupen.com/english/advisories/2006/4146 | vdb entry |
http://www.securityfocus.com/bid/20654 | vdb entry |
http://secunia.com/advisories/22496 | third party advisory vendor advisory |
http://www.osvdb.org/29935 | vdb entry |
http://www.osvdb.org/29937 | vdb entry |
http://www.osvdb.org/29938 | vdb entry |
http://www.osvdb.org/29936 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29703 | vdb entry |