[原文]Multiple PHP remote file inclusion vulnerabilities in Redaxo 3.0 allow remote attackers to execute arbitrary PHP code via a URL in the REX[INCLUDE_PATH] parameter to (1) simple_user/pages/index.inc.php and (2) stats/pages/index.inc.php.
REDAXO contains a flaw that may allow a remote attacker to execute arbitrary commands or code. The issue is due to the 'redaxo/include/addons/image_resize/pages/index.inc.php' script not properly sanitizing user input supplied to the 'RED[INCLUDE_PATH]' parameter. This may allow an attacker to include a file from a third-party remote host that contains commands or code that will be executed by the vulnerable script with the same privileges as the web server.
OSVDB is not aware of a solution for this vulnerability.