News Feed
Sections




News Archive
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Community News:
DreamStats "rootpath" File Inclusion Vulnerability Identified
February 06, 2007 @ 11:37:00

As the International PHP Maagzine reports today there's been a file inclusion vulnerability found (from Secunia) in the DreamStats package:

Secunia's latest advisory points out a vulnerability in DreamStats, which could be exploited by remote attackers to execute arbitrary commands. This issue is due to an input validation error in the "index.php" script that does not validate the "rootpath" parameter, which could be exploited by remote attackers to include malicious PHP scripts and execute arbitrary commands with the privileges of the web server.

Those at risk are systems running versions 4.2 and prior and should update immediately. DreamStats is a package for displaying the statistics for Call of Duty related games on a website.

0 comments voice your opinion now!
dreamstats file inclusion vulnerability secunia dreamstats file inclusion vulnerability secunia


blog comments powered by Disqus

Similar Posts

CyberInsecure.com: Half-Million Sites Mostly Running PHPBB Forum Software Hacked In Latest Attack

ThinkPHP Blog: Make the download of large files with PHP (and lighty) very easy

PHPMaster.com: A Tour of PHP.INI

Secunia.com: phpChess Community Edition Multiple File Inclusion

Hardened-PHP Project: Advisory - phpMyAdmin Multiple CSRF Vulnerabilities


Community Events





Don't see your event here?
Let us know!


interview developer release application introduction code laravel install threedevsandamaybe community language configure unittest wordpress api library series list bugfix podcast

All content copyright, 2014 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework