Multiple PHP remote file inclusion vulnerabilities in DotWidget For Articles (dotwidgeta) 0.2 allow remote attackers to execute arbitrary code via a URL in the (1) file_path parameter to (a) index.php, (b) showcatpicks.php, and (c) showarticle.php; and the (2) admin_header_file and (3) admin_footer_file parameters to (d) admin/authors.php, (e) admin/index.php, (f) admin/categories.php, (g) admin/editconfig.php, and (h) admin/articles.php.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/437483 | mailing list exploit |
http://securityreason.com/securityalert/2308 | third party advisory |
http://www.securityfocus.com/bid/18479 | vdb entry exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27327 | vdb entry |