Description
PHP remote file inclusion vulnerability in lib/php/phphtmllib-2.5.4/examples/example6.php for maintain 3.0.0-RC2 allows remote attackers to execute arbitrary PHP code via a URL in the phphtmllib parameter. NOTE: this issue might be in phpHtmlLib. NOTE: CVE disputes this issue for proper installations of maintain, since $phphtmllib is set in includes.inc before being used in example6.php
Exploits (1)
References (4)
Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/29596
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/20560
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/2359
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/448780/100/0/threaded
Scores
EPSS
0.0326
EPSS Percentile
87.2%
Details
Status
published
Products (1)
osu_open_source_lab/maintain
3.0.0_rc_2
Published
Mar 06, 2007
Tracked Since
Feb 18, 2026