PHP remote file inclusion vulnerability in includes/session.php in Wheatblog (wB) 1.1 and previous versions, when register_globals is enabled, allows remote malicious users to execute arbitrary PHP code via a URL in the wb_class_dir parameter.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
wheatblog wheatblog 1.0 |
||
wheatblog wheatblog |