Description
Multiple PHP remote file inclusion vulnerabilities in Open Education System (OES) 0.1beta allow remote attackers to execute arbitrary PHP code via a URL in the CONF_INCLUDE_PATH parameter to (1) lib-account.inc.php, (2) lib-file.inc.php, (3) lib-group.inc.php, (4) lib-log.inc.php, (5) lib-mydb.inc.php, (6) lib-template-mod.inc.php, and (7) lib-themes.inc.php in includes/.
Exploits (1)
References (5)
Core 5
Core References
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2007/0920
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/462670/100/0/threaded
Exploit x_refsource_misc
http://advisories.echo.or.id/adv/adv69-K-159-2007.txt
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/22934
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/2421
Scores
EPSS
0.0273
EPSS Percentile
86.0%
Details
CWE
CWE-94
Status
published
Products (1)
danny_ho/oes
0.1 beta
Published
Mar 14, 2007
Tracked Since
Feb 18, 2026