Description
Multiple PHP remote file inclusion vulnerabilities in ezContents 2.0.2 and earlier allow remote attackers to execute arbitrary PHP code from a remote web server, as demonstrated using (1) the GLOBALS[rootdp] parameter to db.php, or (2) the GLOBALS[language_home] parameter to archivednews.php, and a malicious version of lang_admin.php.
Exploits (2)
exploitdb
WRITEUP
VERIFIED
by Cedric Cochin · textwebappsphp
https://www.exploit-db.com/exploits/23683
exploitdb
WRITEUP
VERIFIED
by Cedric Cochin · textwebappsphp
https://www.exploit-db.com/exploits/23684
References (2)
Core 2
Core References
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=107651585921958&w=2
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/15135
Scores
EPSS
0.0144
EPSS Percentile
80.8%
Details
Status
published
Products (12)
visualshapers/ezcontents
1.40
visualshapers/ezcontents
1.41
visualshapers/ezcontents
1.42
visualshapers/ezcontents
1.43
visualshapers/ezcontents
1.44
visualshapers/ezcontents
1.45
visualshapers/ezcontents
1.45b
visualshapers/ezcontents
2.0.1
visualshapers/ezcontents
2.0.2
visualshapers/ezcontents
2.0_rc1
... and 2 more
Published
Mar 03, 2004
Tracked Since
Feb 18, 2026