PHP remote file inclusion vulnerability in Stud.IP 1.3.0-2 and previous versions, when register_globals is enabled, allows remote malicious users to execute arbitrary PHP code via the (1) _PHPLIB[libdir] parameter in studip-phplib/oohforms.inc and (2) ABSOLUTE_PATH_STUDIP parameter in studip-htdocs/archiv_assi.php.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
stud.ip stud.ip |