This exploit is a local privilege escalation vulnerability in the Linux operating system. It is coded by jolmos@7a69ezine.org and sha0@BadCheckSum.com. It uses a buffer overflow to inject malicious code into a writable binary, such as /bin/ls, which is then executed with root privileges. This allows the attacker to gain access to the system with root privileges.
A remote file include vulnerability exists in PHPMyNews 1.4 and earlier versions. The vulnerability is due to the application failing to properly sanitize user-supplied input to the 'cfg_include_dir' parameter of the 'disp_form.php3', 'disp_smileys.php3', 'little_news.php3' and 'index.php3' scripts. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system by supplying a malicious URL in the 'cfg_include_dir' parameter.
FreeForum 0.9.7 is vulnerable to a remote file include vulnerability. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'fpath' parameter of the 'forum.php' script. An attacker can exploit this vulnerability to include arbitrary remote files, allowing for the execution of arbitrary PHP code on the vulnerable system.
A vulnerability in phpBB User Viewed Posts Tracker Version <= 1.0 allows an attacker to include a remote file via the phpbb_root_path parameter in the includes/functions_user_viewed_posts.php script.
A remote file inclusion vulnerability exists in Dimension of phpBB 0.2.5 (phpBB 2.0.21). An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system. The vulnerability is due to insufficient sanitization of user-supplied input to the 'phpbb_root_path' parameter in the 'themen_portal_mitte.php' and 'logger_engine.php' scripts. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable system. Successful exploitation will result in arbitrary code execution on the vulnerable system.
This vulnerability allows remote attackers to execute arbitrary PHP code on vulnerable installations of phpBB. Authentication is not required to exploit this vulnerability. The vulnerability is caused due to the "logger_engine.php" script not properly sanitizing user-supplied input to the "phpbb_root_path" parameter. This can be exploited to include arbitrary local or remote PHP files.
A remote file include vulnerability exists in phpMyTeam v2.0, due to the application not properly sanitizing user-supplied input. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system. The vulnerability is due to the application not properly sanitizing user-supplied input to the 'smileys_dir' parameter in the 'smileys_packs.php' script. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system by supplying a malicious URL in the 'smileys_dir' parameter.
Variable $phpbb_root_path not sanitized.When register_globals=on an attacker can exploit this vulnerability with a simple php injection script.
The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'PHPGREETZ_INCLUDE_DIR' parameter to the 'footer.php' script. This can be exploited to include arbitrary files from remote hosts and execute arbitrary PHP code.
A vulnerability exists in the Admin Topic Action Logging (ATAL) version 0.95 for phpBB (2.0.x - 2.0.21). An attacker can exploit this vulnerability to include a remote file containing malicious code which will be executed by the vulnerable application on the web server.