Multiple PHP remote file inclusion vulnerabilities in phpFFL 1.24 allow remote attackers to execute arbitrary PHP code via a URL in the PHPFFL_FILE_ROOT parameter to (1) admin.php, (2) custom_pages.php, (3) draft.php, (4) faq.php, (5) leagues.php, (6) livedraft.php, (7) login.php, (8) my_team.php, (9) profile.php, (10) signup.php, (11) statistics.php, (12) transactions.php, (13) program_files/admin/custom_pages.php, or (14) program_files/common.php. NOTE: the program_files/livedraft/admin.php and program_files/livedraft/livedraft.php vectors are covered by CVE-2007-4934.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://osvdb.org/39655 | vdb entry |
http://osvdb.org/39656 | vdb entry |
http://osvdb.org/39652 | vdb entry |
http://arfis.wordpress.com/2007/09/14/rfi-02-phpffl-fantasy-football-league-manager/ | |
http://osvdb.org/39657 | vdb entry |
http://www.vupen.com/english/advisories/2007/3176 | vdb entry |
http://osvdb.org/39658 | vdb entry |
http://sourceforge.net/project/shownotes.php?release_id=539716&group_id=137531 | |
http://osvdb.org/39660 | vdb entry |
http://sourceforge.net/forum/forum.php?forum_id=735906 | |
http://osvdb.org/39659 | vdb entry |
http://osvdb.org/39654 | vdb entry |
http://secunia.com/advisories/26812 | third party advisory |
http://osvdb.org/39653 | vdb entry |
http://osvdb.org/39651 | vdb entry |
http://osvdb.org/39650 | vdb entry |