First published: Thu Dec 10 2009(Updated: )
PHP remote file inclusion vulnerability in components/core/connect.php in AROUNDMe 1.1 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the language_path parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
barnraiser AROUNDMe | =0.5.1 | |
barnraiser AROUNDMe | =0.6.9 | |
barnraiser AROUNDMe | =0.5.2 | |
AroundMe | =0.7.7 | |
AroundMe | <=1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4264 is considered to be of high severity due to its potential to allow remote code execution.
To fix CVE-2009-4264, disable register_globals in your PHP configuration and update AROUNDMe to a version later than 1.1 where the vulnerability is resolved.
CVE-2009-4264 affects AROUNDMe versions 0.5.1, 0.5.2, 0.6.9, and 0.7.7.
CVE-2009-4264 is a PHP remote file inclusion vulnerability that allows arbitrary code execution.
Any server running the affected versions of AROUNDMe with register_globals enabled is at risk from CVE-2009-4264.