Multiple vulnerabilities have been identified in Inertianews, which could be exploited by attackers to execute arbitrary commands. These issues are due to input validation errors in various scripts (e.g. "inertianews_main.php" or "inertianews_class.php") that do not validate certain parameters (e.g. "inews_path" or "DOCUMENT_ROOT"), which could be exploited by attackers to include malicious PHP scripts and execute arbitrary commands with the privileges of the web server.
Vulnerable Products
Vulnerable Software: inertianews version 0.02 and prior