OpenSIS 'modname' PHP Code Execution
http://packetstormsecurity.com/files/124567/opensis_modname_exec.rb.txt
This Metasploit module exploits a PHP code execution vulnerability in OpenSIS versions 4.5 to 5.2 which allows any authenticated user to execute arbitrary PHP code under the context of the web-server user. The 'ajax.php' file calls 'eval()' with user controlled data from the 'modname' parameter.