PHP remote file inclusion vulnerability in includes/session.php in Wheatblog (wB) 1.1 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the wb_class_dir parameter.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wheatblog | Wheatblog | * | 1.1 (including) |
Wheatblog | Wheatblog | 1.0 (including) | 1.0 (including) |