| VID |
21454 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The KorWeblog has an 'index.php' PHP File Injection Vulnerability. KorWeblog is a PHP and MySQL weblog for Linux-based operating systems. KorWeblog versions 1.6.2-cvs and earlier could allow a remote attacker to inject malicious PHP files, caused by a failure of the application to properly validate the user-supplied in the 'index.php' script. By sending a specially-crafted URL request to the 'index.php' script that uses the 'lng' variable to specify a malicious file from a remote system, a remote attacker could cause the target server to include and execute arbitrary PHP code located on a remote server.
* References: http://securitytracker.com/alerts/2005/Jan/1012745.html http://archives.neohapsis.com/archives/bugtraq/2004-12/0451.html
* Platforms Affected: KorWeblog 1.6.2-cvs and prior Linux Any version |
| Recommendation |
Apply the appropriate patch for this problem available from the KorWeblog Web Site at http://sourceforge.net/projects/eunjea/ |
| Related URL |
CVE-2004-1427 (CVE) |
| Related URL |
12132 (SecurityFocus) |
| Related URL |
18717 (ISS) |
|