Owl.Intranet.Engine.Remote.File.Inclusion

description-logoDescription

It indicates a possible exploit of a remote file inclusion vulnerability in lib/OWL_API.php in OWL Intranet Engine 0.82, when register_globals is enabled, that may allow remote attackers to include arbitrary files via a URL in the xrms_file_root parameter.

affected-products-logoAffected Products

Owl Owl Intranet Engine 0.82

Impact logoImpact

System compromise.

recomended-action-logoRecommended Actions

Refer to the vendor's web site for suggested workaround.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-01-24 15.765 Default_action:pass:drop
2020-01-15 15.758 Sig Added

References

2006-1149