Description
PHP remote file inclusion vulnerability in template/simpledefault/admin/_masterlayout.php in Mundi Mail 0.8.2, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the top parameter. NOTE: when allow_url_fopen is disabled, directory traversal attacks are possible to include and execute arbitrary local files.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2009-2091 | PHP remote file inclusion vulnerability in template/simpledefault/admin/_masterlayout.php in Mundi Mail 0.8.2, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the top parameter. NOTE: when allow_url_fopen is disabled, directory traversal attacks are possible to include and execute arbitrary local files. |
References
| Link | Providers |
|---|---|
| https://www.exploit-db.com/exploits/8948 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T05:36:20.997Z
Reserved: 2009-06-17T00:00:00.000Z
Link: CVE-2009-2095
No data.
Status : Deferred
Published: 2009-06-17T17:30:00.327
Modified: 2025-04-09T00:30:58.490
Link: CVE-2009-2095
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD