Multiple PHP remote file inclusion vulnerabilities in ol'bookmarks 0.7.4 allow remote attackers to execute arbitrary PHP code via a URL in the root parameter to (1) test1.php, (2) blackorange.php, (3) default.php, (4) frames1.php, (5) frames1_top.php, (7) test2.php, (8) test3.php, (9) test4.php, (10) test5.php, (11) test6.php, (12) frames1_left.php, and (13) frames1_center.php in themes/.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://osvdb.org/36502 | vdb entry |
http://osvdb.org/36503 | vdb entry |
http://osvdb.org/36495 | vdb entry |
http://osvdb.org/36499 | vdb entry |
http://osvdb.org/36494 | vdb entry |
http://osvdb.org/36498 | vdb entry |
http://www.vupen.com/english/advisories/2007/1893 | vdb entry vendor advisory |
http://www.attrition.org/pipermail/vim/2007-May/001623.html | mailing list |
https://www.exploit-db.com/exploits/3962 | exploit |
http://secunia.com/advisories/25356 | third party advisory vendor advisory |
http://osvdb.org/36501 | vdb entry |
http://osvdb.org/36504 | vdb entry |
http://osvdb.org/36493 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34402 | vdb entry |
http://osvdb.org/36497 | vdb entry |
http://osvdb.org/36500 | vdb entry |
http://www.securityfocus.com/bid/24083 | vdb entry exploit |
http://osvdb.org/36496 | vdb entry |