Korean
<< Back
VID 210060
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The XOOPS program is vulnerable to a remote file include vulnerability via the 'dir_module' parameter. XOOPS is a dynamic object oriented based open source portal system written in PHP. XFSection is a third-party module for XOOPS.. XOOPS XFsection Module versions 1.07 and earlier could allow a remote attacker to include malicious PHP files, caused by improper validation of user-supplied input passed to the 'dir_module' parameter of the 'modify.php' script. Regardless of PHP's 'register_globals' setting, a remote attacker could send a specially-crafted URL request to execute arbitrary PHP code and operating system commands on the affected host.

* References:
http://www.milw0rm.com/exploits/4068

* Platforms Affected:
Planet XOOPS: XOOPS XFsection Module versions 1.07 and earlier
Any operating system Any version
Recommendation No upgrade or patch available as of June 2014.

Upgrade to a fixed version of XOOPS XFsection module, available from the XOOPS XFsection module Web site at http://www.xoops.org/modules/repository/singlefile.php?cid=95&lid=1390
Related URL CVE-2007-3222 (CVE)
Related URL 24465 (SecurityFocus)
Related URL 34853 (ISS)