Описание
PHP remote file inclusion vulnerability in Webspotblogging 3.0.1 allows remote attackers to execute arbitrary PHP code via a URL in the path parameter to (1) inc/logincheck.inc.php, (2) inc/adminheader.inc.php, (3) inc/global.php, or (4) inc/mainheader.inc.php. NOTE: some of these vectors were also reported for 3.0 in a separate disclosure.
PHP remote file inclusion vulnerability in Webspotblogging 3.0.1 allows remote attackers to execute arbitrary PHP code via a URL in the path parameter to (1) inc/logincheck.inc.php, (2) inc/adminheader.inc.php, (3) inc/global.php, or (4) inc/mainheader.inc.php. NOTE: some of these vectors were also reported for 3.0 in a separate disclosure.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-2860
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26910
- https://www.exploit-db.com/exploits/1871
- http://arfis.wordpress.com/2007/09/14/rfi-02-webspotblogging
- http://secunia.com/advisories/20439
- http://www.osvdb.org/25992
- http://www.osvdb.org/25993
- http://www.osvdb.org/25994
- http://www.osvdb.org/25995
- http://www.securityfocus.com/archive/1/447001/100/0/threaded
- http://www.securityfocus.com/archive/1/447576/100/200/threaded
- http://www.securityfocus.com/bid/18260
- http://www.vupen.com/english/advisories/2006/2127
Связанные уязвимости
PHP remote file inclusion vulnerability in Webspotblogging 3.0.1 allows remote attackers to execute arbitrary PHP code via a URL in the path parameter to (1) inc/logincheck.inc.php, (2) inc/adminheader.inc.php, (3) inc/global.php, or (4) inc/mainheader.inc.php. NOTE: some of these vectors were also reported for 3.0 in a separate disclosure.