PHP remote file inclusion vulnerability in system/funcs/xkurl.php in xKiosk WEB 3.0.1i, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the PEARPATH parameter. The vendor has provided the following patch information:
The patch is located at
http://xkiosk.net/xkiosk.3.0.1j.web.5314.fix.zip
How to apply the fix:
Extract "upload" folder contents to your current xKiosk WEB installation, overwrite if required.
Publication date: Wed, 10 Oct 2007 02:17:00 +0000