PHP remote file inclusion vulnerability in manager/tools/link/dbinstall.php in Plume CMS 1.1.3 allows remote attackers to execute arbitrary PHP code via a URL in the _PX_config[manager_path] parameter.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.hamid.ir/security/plume.txt | exploit |
http://www.securiteam.com/unixfocus/5KP031FJ5A.html | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27535 | vdb entry |
http://www.securityfocus.com/bid/18750 | vdb entry |
http://www.securitytracker.com/id?1016415 | vdb entry |