Description
PHP remote file inclusion vulnerability in ToendaCMS 1.0.3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the tcms_administer_site parameter to an unspecified script, probably index.php. NOTE: this issue has been disputed by a third party, who states that $tcms_administer_site is initialized to a constant value within index.php
Exploits
284172006-08-21webappsPHP
ToendaCMS 0.x/1.0.x - 'TCMS_Administer' Remote File Inclusion
By You_You
References
cve@mitre.org
http://www.osvdb.org/29358cve@mitre.org
http://www.securityfocus.com/bid/19626af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29358af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/443918/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/444236/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/19626af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/28491