PHP remote file inclusion vulnerability in lib/OWL_API.php in OWL Intranet Engine 0.82, when register_globals is enabled, allows remote attackers to include arbitrary files via a URL in the xrms_file_root parameter, which is not initialized before use.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Owl_intranet_engine | Owl | 0.6 (including) | 0.6 (including) |
Owl_intranet_engine | Owl | 0.8 (including) | 0.8 (including) |
Owl_intranet_engine | Owl | 0.72 (including) | 0.72 (including) |
Owl_intranet_engine | Owl | 0.73 (including) | 0.73 (including) |
Owl_intranet_engine | Owl | 0.82 (including) | 0.82 (including) |