Multiple PHP remote file inclusion vulnerabilities in PHP Project Management 0.8.10 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the full_path parameter to (1) certinfo/index.php, (2) emails/index.php, (3) events/index.php, (4) fax/index.php, (5) files/index.php, (6) files/list.php, (7) groupadm/index.php, (8) history/index.php, (9) info/index.php, (10) log/index.php, (11) mail/index.php, (12) messages/index.php, (13) organizations/index.php, (14) phones/index.php, (15) presence/index.php, (16) projects/index.php, (17) projects/summary.inc.php, (18) projects/list.php, (19) reports/index.php, (20) search/index.php, (21) snf/index.php, (22) syslog/index.php, (23) tasks/searchsimilar.php, (24) tasks/index.php, (25) tasks/summary.inc.php, and (26) useradm/index.php in modules; (27) /ajax/loadsplash.php; (28) /blocks/birthday.php; (29) /blocks/events.php; and (30) /blocks/help.php.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://osvdb.org/41914 | vdb entry |
http://osvdb.org/41907 | vdb entry |
https://www.exploit-db.com/exploits/4549 | exploit |
http://osvdb.org/41917 | vdb entry |
http://osvdb.org/41910 | vdb entry |
http://osvdb.org/41906 | vdb entry |
http://osvdb.org/41957 | vdb entry |
http://osvdb.org/41905 | vdb entry |
http://osvdb.org/41920 | vdb entry |
http://osvdb.org/41975 | vdb entry |
http://osvdb.org/41908 | vdb entry |
http://osvdb.org/41931 | vdb entry |
http://osvdb.org/41918 | vdb entry |
http://osvdb.org/41925 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/37347 | vdb entry |
http://osvdb.org/41934 | vdb entry |
http://osvdb.org/41927 | vdb entry |
http://www.securityfocus.com/bid/26150 | vdb entry |
http://osvdb.org/41909 | vdb entry |
http://osvdb.org/41928 | vdb entry |
http://osvdb.org/41912 | vdb entry |
http://secunia.com/advisories/27347 | third party advisory vendor advisory |
http://osvdb.org/41913 | vdb entry |