Multiple PHP remote file inclusion vulnerabilities in Openads (aka phpAdsNew) 2.0.7 allow remote attackers to execute arbitrary PHP code via a URL in the (1) phpAds_geoPlugin parameter to libraries/lib-remotehost.inc, the (2) filename parameter to admin/report-index, or the (3) phpAds_config[my_footer] parameter to admin/lib-gui.inc. NOTE: the vendor has disputed this issue, stating that the relevant variables are used within function definitions
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/457806/100/200/threaded | mailing list |
http://www.securityfocus.com/archive/1/457991/100/200/threaded | mailing list |
http://securityreason.com/securityalert/2174 | third party advisory |
http://www.securityfocus.com/bid/22172 | vdb entry |
http://osvdb.org/33573 | vdb entry |
http://www.securityfocus.com/archive/1/457670/100/0/threaded | mailing list |