Multiple PHP remote file inclusion vulnerabilities in ELSEIF CMS Beta 0.6 allow remote attackers to execute arbitrary PHP code via a URL in the (1) contenus parameter to (a) contenus.php; the (2) tpelseifportalrepertoire parameter to (b) votes.php, (c) espaceperso.php, (d) enregistrement.php, (e) commentaire.php, and (f) coeurusr.php in utilisateurs/, and (g) articles/fonctions.php and (h) depot/fonctions.php in moduleajouter/; the (3) corpsdesign parameter to (i) articles/usrarticles.php and (j) depot/usrdepot.php in moduleajouter/; and possibly other files.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://osvdb.org/38656 | vdb entry |
http://osvdb.org/38649 | vdb entry |
http://osvdb.org/38651 | vdb entry |
http://osvdb.org/38653 | vdb entry |
http://www.securityfocus.com/bid/25951 | vdb entry exploit |
http://osvdb.org/38652 | vdb entry |
http://osvdb.org/38658 | vdb entry |
http://osvdb.org/38654 | vdb entry |
http://osvdb.org/38650 | vdb entry |
http://osvdb.org/38655 | vdb entry |
http://www.securityfocus.com/archive/1/481683/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/37011 | vdb entry |
http://securityreason.com/securityalert/3204 | third party advisory |
http://osvdb.org/38657 | vdb entry |