Multiple PHP remote file inclusion vulnerabilities in IAPR COMMENCE 1.3 allow remote attackers to execute arbitrary PHP code via a URL in the (a) php_root_path and sometimes the (b) privilege_root_path parameter to various PHP scripts under (1) admin/includes/, (2) admin/phase/, (3) includes/, (4) includes/page_includes/, (5) reviewer/includes/, (6) reviewer/phase/, and (7) user/phase/.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/4659 | exploit |
http://secunia.com/advisories/27788 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/26570 | vdb entry exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/38641 | vdb entry |