index.php in PEGames uses the extract function to overwrite critical variables, which allows remote attackers to conduct PHP remote file inclusion attacks via the abs_url parameter, which is later extracted to overwrite a previously uncontrolled value.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Pegames | Pegames | * | * |