Intrusion Prevention



phpRealty has multiple remote file inclusion vulnerabilities. A remote attacker can execute arbitrary script code on the web server with the privileges of the server via a specially crafted URL request to 'index.php', 'p_ins.php' or 'u_ins.php' with the 'root_path' parameter set to specify a malicious PHP file from a remote system.

Affected Products

phpRealty 0.02


System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Currently we are not aware of any vendor supplied patch for this issue.

CVE References