Multiple PHP remote file inclusion vulnerabilities in Portail Web Php 2.5.1.1 allow remote attackers to execute arbitrary PHP code via a URL in the site_path parameter to (1) config/conf-activation.php, (2) menu/item.php, and (3) modules/conf_modules.php in admin/system/; and (4) system/login.php.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securityfocus.com/bid/27616 | Exploit | 
| http://www.securityfocus.com/bid/27616 | Exploit | 
Configurations
                    History
                    No history.
Information
                Published : 2008-02-07 21:00
Updated : 2025-04-09 00:30
NVD link : CVE-2008-0645
Mitre link : CVE-2008-0645
CVE.ORG link : CVE-2008-0645
JSON object : View
Products Affected
                portail_web_php
- portail_web_php
 
CWE
                
                    
                        
                        CWE-94
                        
            Improper Control of Generation of Code ('Code Injection')
