Multiple PHP remote file inclusion vulnerabilities in TagIt! Tagboard 2.1.B Build 2 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) configpath parameter to (a) tagviewer.php, (b) tag_process.php, and (c) CONFIG/errmsg.inc.php; and (d) addTagmin.php, (e) ban_watch.php, (f) delTagmin.php, (g) delTag.php, (h) editTagmin.php, (i) editTag.php, (j) manageTagmins.php, and (k) verify.php in tagmin/; the (2) adminpath parameter to (l) tagviewer.php, (m) tag_process.php, and (n) tagmin/index.php; and the (3) admin parameter to (o) readconf.php, (p) updateconf.php, (q) updatefilter.php, and (r) wordfilter.php in tagmin/; different vectors than CVE-2006-5249.
Link | Tags |
---|---|
http://www.osvdb.org/34618 | vdb entry |
http://www.osvdb.org/34614 | vdb entry |
http://advisories.echo.or.id/adv/adv65-K-159-2007.txt | |
http://www.osvdb.org/34616 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32436 | vdb entry |
http://www.osvdb.org/34607 | vdb entry |
http://www.osvdb.org/34609 | vdb entry |
http://www.osvdb.org/34611 | vdb entry |
http://www.vupen.com/english/advisories/2007/0557 | vdb entry |
http://www.osvdb.org/34613 | vdb entry |
http://www.osvdb.org/34610 | vdb entry |
http://www.securityfocus.com/bid/22518 | vdb entry |
http://www.osvdb.org/34608 | vdb entry |
http://www.osvdb.org/34605 | vdb entry |
http://www.osvdb.org/34606 | vdb entry |
http://www.osvdb.org/34615 | vdb entry |
http://www.osvdb.org/34603 | vdb entry |
http://www.osvdb.org/34612 | vdb entry |
http://www.osvdb.org/34617 | vdb entry |
http://www.osvdb.org/34604 | vdb entry |