Multiple vulnerabilities have been identified in Really Simple PHP and Ajax (RSPA), which could be exploited by attackers to execute arbitrary commands.
The first issue is due to input validation errors in the "framework/Controller_v5.php" and "framework/Controller_v4.php" scripts when processing the "__IncludeFilePHPClass" and "__ClassPath" parameters, which could be exploited by remote attackers to include malicious scripts and execute arbitrary commands with the privileges of the web server.
The second vulnerability is due to input validation errors in the "framework/Controller_v5.php" and "framework/Controller_v4.php" scripts when processing the "__class" parameter, which could be exploited by remote attackers to include or disclose the contents of local files with the privileges of the web server.
Vulnerable Products
Vulnerable Software: Really Simple PHP and Ajax (RSPA) version 2007-03-23 and prior