Multiple PHP remote file inclusion vulnerabilities in Openads (aka phpAdsNew) 2.0.7 allow remote attackers to execute arbitrary PHP code via a URL in the (1) phpAds_geoPlugin parameter to libraries/lib-remotehost.inc, the (2) filename parameter to admin/report-index, or the (3) phpAds_config[my_footer] parameter to admin/lib-gui.inc. NOTE: the vendor has disputed this issue, stating that the relevant variables are used within function definitions
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2007-01-25T00:00:00
Updated: 2018-10-16T14:57:01
Reserved: 2007-01-24T00:00:00
Link: CVE-2007-0486
JSON object: View
NVD Information
Status : Modified
Published: 2007-01-25T00:28:00.000
Modified: 2024-05-17T00:32:31.503
Link: CVE-2007-0486
JSON object: View
Redhat Information
No data.
CWE