"value":"PHP remote file inclusion vulnerability in buycd.php in Paristemi 0.8.3 allows remote attackers to execute arbitrary PHP code via a URL in the HTTP_DOCUMENT_ROOT parameter, a different vector than CVE-2006-6689."
},
{
"lang":"es",
"value":"Vulnerabilidad de inclusi\u00f3n remota de archivo en PHP en buycd.php de Paristemi 0.8.3 permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante una URL en el par\u00e1metro HTTP_DOCUMENT_ROOT, un vector distinto de CVE-2006-6689."
"evaluatorSolution":"Successful exploitation requires that \"register_globals\" is enabled.\r\nThis vulnerability is addressed in the following product release:\r\nParistemi, Paristemi, 0.8.4"