PHP remote file inclusion vulnerability in modules/bannieres/bannieres.php in Jean-Christophe Ramos SCRIPT BANNIERES (aka ban 0.1 and PLS-Bannieres 1.21) allows remote attackers to execute arbitrary PHP code via a URL in the chemin parameter. NOTE: the issue is disputed by other researchers, who observe that $chemin is defined before use
Link | Tags |
---|---|
http://www.securityfocus.com/bid/20772 | vdb entry |
http://www.securityfocus.com/archive/1/450297/100/200/threaded | mailing list |
http://www.securityfocus.com/archive/1/449955/100/200/threaded | mailing list |
http://www.securityfocus.com/archive/1/449927/100/200/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29856 | vdb entry |
http://www.securityfocus.com/archive/1/449910/100/200/threaded | mailing list |