Scallywag "path" and "skin_name" Parameters Remote and Local File Inclusion Issues
Description
Multiple vulnerabilities have been identified in Scallywag, which could be exploited by attackers to execute arbitrary commands or disclose sensitive information. These issues are caused by input validation errors in various scripts (e.g. "skin/dark/template.php", "skin/gold/template.php" and "skin/original/template.php") when processing the "path" and "skin_name" parameters, which could be exploited by remote attackers to include remote or local files with the privileges of the web server.