The remote web server contains a PHP application that is susceptible to multiple remote file inclusion attacks.
Description
The version of phpList installed on the remote host fails to filter user input to the '_SERVER[ConfigFile]' and '_ENV[CONFIG]' parameters of the 'admin/index.php' script before passing it to PHP 'include()' functions. Provided PHP's 'register_globals' setting is disabled, an unauthenticated attacker can exploit this issue to view arbitrary files on the remote host or to execute arbitrary PHP code, possibly taken from third-party hosts.