Description
PHP remote file inclusion vulnerability in security/include/_class.security.php in Web3news 0.95 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the PHPSECURITYADMIN_PATH parameter.
Exploits
22692006-08-28webappsPHP
Web3news 0.95 - 'PHPSECURITYADMIN_PATH' Remote File Inclusion
By SHiKaA
References
cve@mitre.org
http://secunia.com/advisories/21640cve@mitre.org
http://www.osvdb.org/28248cve@mitre.org
http://www.securityfocus.com/bid/19744cve@mitre.org
http://www.vupen.com/english/advisories/2006/3407cve@mitre.org
https://www.exploit-db.com/exploits/2269af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21640af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/28248af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/19744af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3407af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/28618af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/2269