| VID |
210060 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The XOOPS program is vulnerable to a remote file include vulnerability via the 'dir_module' parameter. XOOPS is a dynamic object oriented based open source portal system written in PHP. XFSection is a third-party module for XOOPS.. XOOPS XFsection Module versions 1.07 and earlier could allow a remote attacker to include malicious PHP files, caused by improper validation of user-supplied input passed to the 'dir_module' parameter of the 'modify.php' script. Regardless of PHP's 'register_globals' setting, a remote attacker could send a specially-crafted URL request to execute arbitrary PHP code and operating system commands on the affected host.
* References: http://www.milw0rm.com/exploits/4068
* Platforms Affected: Planet XOOPS: XOOPS XFsection Module versions 1.07 and earlier Any operating system Any version |
| Recommendation |
No upgrade or patch available as of June 2014.
Upgrade to a fixed version of XOOPS XFsection module, available from the XOOPS XFsection module Web site at http://www.xoops.org/modules/repository/singlefile.php?cid=95&lid=1390 |
| Related URL |
CVE-2007-3222 (CVE) |
| Related URL |
24465 (SecurityFocus) |
| Related URL |
34853 (ISS) |
|