A vulnerability has been identified in the handling of input by Gemitel. Because of this, it may be possible for a remote user to gain unauthorized access to a system using the vulnerable software. It is possible to influence the include path of certain files, which could lead to an attacker including arbitrary PHP files from an external system.
A vulnerability has been identified in the handling of input by Gemitel. Because of this, it may be possible for a remote user to gain unauthorized access to a system using the vulnerable software. It is possible to influence the include path of certain files, which could lead to an attacker including arbitrary PHP files from an external system.