Description
PHP remote file inclusion vulnerability in resources/includes/class.Smarty.php in Pixaria Gallery before 1.4.3 allows remote attackers to execute arbitrary PHP code via a URL in the cfg[sys][base_path] parameter.
Exploits (1)
References (10)
Core 10
Core References
Patch, URL Repurposed x_refsource_confirm
http://www.pixaria.com/news/article/71/
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/3733
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/465847/100/200/threaded
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2007/1390
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/33662
Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/23489
URL Repurposed x_refsource_confirm
http://www.pixaria.com/news/article/70/
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/24821
URL Repurposed x_refsource_confirm
http://pixaria.com/index.history.php
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/34976
Scores
EPSS
0.1051
EPSS Percentile
93.3%
Details
Status
published
Products (21)
pixaria/pixaria_gallery
1.0.1
pixaria/pixaria_gallery
1.0.2
pixaria/pixaria_gallery
1.0.3
pixaria/pixaria_gallery
1.0.4
pixaria/pixaria_gallery
1.0.5
pixaria/pixaria_gallery
1.1
pixaria/pixaria_gallery
1.1.1
pixaria/pixaria_gallery
1.1.2
pixaria/pixaria_gallery
1.1.3
pixaria/pixaria_gallery
1.1.4
... and 11 more
Published
May 02, 2007
Tracked Since
Feb 18, 2026