VID |
21774 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The XOOPS program is vulnerable to multiple local file inclusion vulnerabilities. XOOPS is a dynamic object oriented based open source portal system written in PHP. XOOPS version 2.2.3 Final and possibly other versions could allow a remote attacker to include malicious PHP files, caused by improper validation of user-supplied input passed to the 'xoopsConfig[language]' parameter of several xoopseditor scripts. A remote attacker could exploit this vulnerability to read arbitrary local files and even execute arbitrary PHP code on the target system. Successful exploitation requires that PHP's 'register_globals' setting be enabled and possibly that 'magic_quotes_gpc' be disabled.
* References: http://rgod.altervista.org/xooops_xpl.html http://archives.neohapsis.com/archives/bugtraq/2005-11/0152.html
* Platforms Affected: XOOPS version 2.2.3 Final and possibly other versions XOOPS WF-Downloads 2.0.5 Any operating system Any version |
Recommendation |
No upgrade or patch available as of November 2005.
Upgrade to the latest version of XOOPS, when new fixed version becomes available from the XOOPS Download Web site at http://www.xoops.org/modules/core/
-- OR --
As a workaround, enable PHP's 'magic_quotes_gpc' setting and disable its 'register_globals' setting. |
Related URL |
CVE-2005-3680 (CVE) |
Related URL |
15406 (SecurityFocus) |
Related URL |
23145,23147 (ISS) |
|