Описание
Multiple PHP remote file inclusion vulnerabilities in Redaction System 1.0000 allow remote attackers to execute arbitrary PHP code via a URL in the (1) lang_prefix parameter to (a) conn.php, (b) sesscheck.php, (c) wap/conn.php, or (d) wap/sesscheck.php, or the (2) lang parameter to (e) index.php.
Multiple PHP remote file inclusion vulnerabilities in Redaction System 1.0000 allow remote attackers to execute arbitrary PHP code via a URL in the (1) lang_prefix parameter to (a) conn.php, (b) sesscheck.php, (c) wap/conn.php, or (d) wap/sesscheck.php, or the (2) lang parameter to (e) index.php.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-5302
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29504
- https://www.exploit-db.com/exploits/2534
- http://redactionsystem.sourceforge.net/index.php?m=news&id=2
- http://redactionsystem.sourceforge.net/index.php?m=news&id=5
- http://secunia.com/advisories/22347
- http://www.osvdb.org/29700
- http://www.osvdb.org/29701
- http://www.osvdb.org/29702
- http://www.osvdb.org/29703
- http://www.osvdb.org/29704
- http://www.securityfocus.com/bid/20499
- http://www.vupen.com/english/advisories/2006/4024
Связанные уязвимости
Multiple PHP remote file inclusion vulnerabilities in Redaction System 1.0000 allow remote attackers to execute arbitrary PHP code via a URL in the (1) lang_prefix parameter to (a) conn.php, (b) sesscheck.php, (c) wap/conn.php, or (d) wap/sesscheck.php, or the (2) lang parameter to (e) index.php.