[原文]Multiple PHP remote file inclusion vulnerabilities in PictureDis Professional 1.33 Build 234 and earlier and PictureDis Photoalbum 4.82 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the lang parameter to files in photoalbum/ including (1) thumstbl.php, (2) wpfiles.php, and (3) wallpapr.php.
PictureDis Products thumstbl.php lang Parameter Remote File Inclusion
Remote / Network Access
Loss of Integrity
PictureDis contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to thumstbl.php not properly sanitizing user input supplied to the 'lang' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.