PHP remote file inclusion vulnerability in inc-calcul.php3 in SPIP 1.7.2 allows remote attackers to execute arbitrary PHP code via a URL in the squelette_cache parameter, a different vector than CVE-2006-1702. NOTE: this issue has been disputed by third party researchers, stating that the squelette_cache variable is initialized before use, and is only used within the scope of a function
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/25416 | vdb entry |
http://securityreason.com/securityalert/3056 | third party advisory |
http://www.securityfocus.com/archive/1/477423/100/0/threaded | mailing list |
http://www.securityfocus.com/archive/1/477728/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36218 | vdb entry |