Description
Multiple PHP remote file inclusion vulnerabilities in ISPConfig 2.2.3 allow remote attackers to execute arbitrary PHP code via a URL in the (1) go_info[isp][classes_root] parameter in (a) server.inc.php, and the (2) go_info[server][classes_root] parameter in (b) app.inc.php, (c) login.php, and (d) trylogin.php. NOTE: this issue has been disputed by the vendor, who states that the original researcher "reviewed the installation tarball that is not identical with the resulting system after installtion. The file, where the $go_info array is declared ... is created by the installer.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Federico Fazzi · textwebappsphp
https://www.exploit-db.com/exploits/28027
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/27474
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/437415/100/100/threaded
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/18441
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/437117/100/0/threaded
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/1098
Scores
EPSS
0.0720
EPSS Percentile
91.6%
Details
Status
published
Products (1)
ispconfig/ispconfig
2.2.3
Published
Jun 15, 2006
Tracked Since
Feb 18, 2026