[原文]PHP remote file inclusion vulnerability in Redaxo 2.7.4 allows remote attackers to execute arbitrary PHP code via a URL in the (1) REX[INCLUDE_PATH] parameter in (a) addons/import_export/pages/index.inc.php and (b) pages/community.inc.php.
REDAXO contains a flaw that may allow a remote attacker to execute arbitrary commands or code. The issue is due to the 'redaxo/include/addons/import_export/pages/index.inc.php' script not properly sanitizing user input supplied to the 'REX[INCLUDE_PATH]' parameter. This may allow an attacker to include a file from a third-party remote host that contains commands or code that will be executed by the vulnerable script with the same privileges as the web server.
OSVDB is not aware of a solution for this vulnerability.