VID |
210060 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The XOOPS program is vulnerable to a remote file include vulnerability via the 'dir_module' parameter. XOOPS is a dynamic object oriented based open source portal system written in PHP. XFSection is a third-party module for XOOPS.. XOOPS XFsection Module versions 1.07 and earlier could allow a remote attacker to include malicious PHP files, caused by improper validation of user-supplied input passed to the 'dir_module' parameter of the 'modify.php' script. Regardless of PHP's 'register_globals' setting, a remote attacker could send a specially-crafted URL request to execute arbitrary PHP code and operating system commands on the affected host.
* References: http://www.milw0rm.com/exploits/4068
* Platforms Affected: Planet XOOPS: XOOPS XFsection Module versions 1.07 and earlier Any operating system Any version |
Recommendation |
No upgrade or patch available as of June 2014.
Upgrade to a fixed version of XOOPS XFsection module, available from the XOOPS XFsection module Web site at http://www.xoops.org/modules/repository/singlefile.php?cid=95&lid=1390 |
Related URL |
CVE-2007-3222 (CVE) |
Related URL |
24465 (SecurityFocus) |
Related URL |
34853 (ISS) |
|