Multiple PHP file inclusion vulnerabilities in MySource 2.14.0 allow remote attackers to execute arbitrary PHP code and include arbitrary local files via the (1) INCLUDE_PATH and (2) SQUIZLIB_PATH parameters in new_upgrade_functions.php, (3) the INCLUDE_PATH parameter in init_mysource.php, and the PEAR_PATH parameter in (4) Socket.php, (5) Request.php, (6) Mail.php, (7) Date.php, (8) Span.php, (9) mimeDecode.php, and (10) mime.php.
marc.info/?l=bugtraq&m=112966933202769&w=2
secunia.com/advisories/16946/
securityreason.com/securityalert/92
securitytracker.com/id?1015075
www.osvdb.org/20035
www.osvdb.org/20036
www.osvdb.org/20037
www.osvdb.org/20038
www.osvdb.org/20039
www.osvdb.org/20040
www.osvdb.org/20041
www.osvdb.org/20042
www.osvdb.org/20043
www.securityfocus.com/bid/15133/discuss
www.vupen.com/english/advisories/2005/2132
exchange.xforce.ibmcloud.com/vulnerabilities/22772