Built2Go Movie Review "full_path" Parameter Remote File Inclusion Vulnerability
Description
A vulnerability has been identified in built2go Movie Review, which may be exploited by attackers to execute arbitrary commands. This flaw is due to an input validation error in the "movie_cls.php" script that does not validate the "full_path" variable, which could be exploited by remote attackers to include malicious scripts and execute arbitrary commands with the privileges of the web server.
Vulnerable Products
Vulnerable Software: Built2Go Movie Review version 1.45 and prior
Solution
Upgrade to Built2Go Movie Review version 1.46 :https://www.built2go.com/mem_download.php/down/61