Multiple PHP remote file inclusion vulnerabilities in telltarget CMS 1.3.3 allow remote attackers to execute arbitrary PHP code via a URL in the (1) ordnertiefe parameter to site_conf.php; or the (2) tt_docroot parameter to (a) class.csv.php, (b) produkte_nach_serie.php, or (c) ref_kd_rubrik.php in functionen/; (d) hg_referenz_jobgalerie.php, (e) surfer_anmeldung_NWL.php, (f) produkte_nach_serie_alle.php, (g) surfer_aendern.php, (h) ref_kd_rubrik.php, or (i) referenz.php in module/; or (j) 1/lay.php or (k) 3/lay.php in standard/.
Link | Tags |
---|---|
http://osvdb.org/38242 | vdb entry |
http://osvdb.org/38239 | vdb entry |
http://osvdb.org/38240 | vdb entry |
https://www.exploit-db.com/exploits/3885 | exploit |
http://www.securityfocus.com/bid/23903 | vdb entry |
http://osvdb.org/38243 | vdb entry |
http://www.vupen.com/english/advisories/2007/1740 | vdb entry |
http://osvdb.org/38244 | vdb entry |
http://osvdb.org/38238 | vdb entry |
http://osvdb.org/38247 | vdb entry |
http://osvdb.org/38246 | vdb entry |
http://osvdb.org/38237 | vdb entry |
http://osvdb.org/38241 | vdb entry |
http://osvdb.org/38245 | vdb entry |
http://osvdb.org/38236 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34216 | vdb entry |