Description
Multiple PHP remote file inclusion vulnerabilities in Direct News 4.10.2, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the rootpath parameter to (1) admin/menu.php and (2) library/lib.menu.php; and the adminroot parameter to (3) admin/media/update_content.php and (4) library/class.backup.php. NOTE: some of these details are obtained from third party information.
Exploits (1)
References (3)
Core 3
Core References
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/11882
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/39106
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/38975
Scores
EPSS
0.0132
EPSS Percentile
80.0%
Details
CWE
CWE-94
Status
published
Products (1)
directnews/direct_news
4.10.2
Published
Apr 09, 2010
Tracked Since
Feb 18, 2026