Multiple PHP remote file inclusion vulnerabilities in PHP Project Management 0.8.10 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the full_path parameter to (1) certinfo/index.php, (2) emails/index.php, (3) events/index.php, (4) fax/index.php, (5) files/index.php, (6) files/list.php, (7) groupadm/index.php, (8) history/index.php, (9) info/index.php, (10) log/index.php, (11) mail/index.php, (12) messages/index.php, (13) organizations/index.php, (14) phones/index.php, (15) presence/index.php, (16) projects/index.php, (17) projects/summary.inc.php, (18) projects/list.php, (19) reports/index.php, (20) search/index.php, (21) snf/index.php, (22) syslog/index.php, (23) tasks/searchsimilar.php, (24) tasks/index.php, (25) tasks/summary.inc.php, and (26) useradm/index.php in modules; (27) /ajax/loadsplash.php; (28) /blocks/birthday.php; (29) /blocks/events.php; and (30) /blocks/help.php.
http://secunia.com/advisories/27347
http://www.securityfocus.com/bid/26150
OR
cpe:2.3:a:phppm:php_project_management:*:*:*:*:*:*:*:* versions up to 0.8.10 (inclusive)
ID | Name | Product | Family | Severity |
---|---|---|---|---|
41198 | SuSE9 Security Update : Tomcat (YOU Patch Number 12078) | Nessus | SuSE Local Security Checks | medium |
31338 | openSUSE 10 Security Update : apache2-mod_jk (apache2-mod_jk-4997) | Nessus | SuSE Local Security Checks | medium |
31319 | openSUSE 10 Security Update : apache2-mod_jk (apache2-mod_jk-4992) | Nessus | SuSE Local Security Checks | medium |
31298 | SuSE 10 Security Update : Tomcat 5 (ZYPP Patch Number 4990) | Nessus | SuSE Local Security Checks | medium |