Multiple PHP remote file inclusion vulnerabilities in dedi-group Der Dirigent 1.0 allow remote attackers to execute arbitrary PHP code via a URL in the dedi_path parameter to (1) inc.generate_code.php, (2) fnc.type_forms.php, or (3) fnc.type.php in backend/inc/, or (4) frontend.php or (5) backend.php in projekt01/cms/inc/; or (6) the this_dir parameter to backend/inc/class.filemanager.php. NOTE: vectors 4 and 5 are disputed by CVE because PHP encounters a fatal function-call error on a direct request for the file, before reaching the include statement.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://osvdb.org/45536 | vdb entry |
http://osvdb.org/45538 | vdb entry |
http://osvdb.org/45540 | vdb entry |
http://osvdb.org/45539 | vdb entry |
http://osvdb.org/45537 | vdb entry |
http://arfis.wordpress.com/2007/09/14/rfi-02-der-dirigent/ | |
http://osvdb.org/45535 | vdb entry |