Owl.Intranet.Engine.Remote.File.Inclusion
Description
It indicates a possible exploit of a remote file inclusion vulnerability in lib/OWL_API.php in OWL Intranet Engine 0.82, when register_globals is enabled, that may allow remote attackers to include arbitrary files via a URL in the xrms_file_root parameter.
Affected Products
Owl Owl Intranet Engine 0.82
Impact
System compromise.
Recommended Actions
Refer to the vendor's web site for suggested workaround.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2020-01-24 | 15.765 | Default_action:pass:drop |
2020-01-15 | 15.758 | Sig Added |