index.php in PEGames uses the extract function to overwrite critical variables, which allows remote attackers to conduct PHP remote file inclusion attacks via the abs_url parameter, which is later extracted to overwrite a previously uncontrolled value.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/30517 | vdb entry |
https://www.exploit-db.com/exploits/2840 | exploit |
http://www.attrition.org/pipermail/vim/2006-November/001153.html | mailing list exploit |
http://www.securityfocus.com/bid/21266 | vdb entry exploit |