Korean
<< Back
VID 21774
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The XOOPS program is vulnerable to multiple local file inclusion vulnerabilities. XOOPS is a dynamic object oriented based open source portal system written in PHP. XOOPS version 2.2.3 Final and possibly other versions could allow a remote attacker to include malicious PHP files, caused by improper validation of user-supplied input passed to the 'xoopsConfig[language]' parameter of several xoopseditor scripts. A remote attacker could exploit this vulnerability to read arbitrary local files and even execute arbitrary PHP code on the target system. Successful exploitation requires that PHP's 'register_globals' setting be enabled and possibly that 'magic_quotes_gpc' be disabled.

* References:
http://rgod.altervista.org/xooops_xpl.html
http://archives.neohapsis.com/archives/bugtraq/2005-11/0152.html

* Platforms Affected:
XOOPS version 2.2.3 Final and possibly other versions
XOOPS WF-Downloads 2.0.5
Any operating system Any version
Recommendation No upgrade or patch available as of November 2005.

Upgrade to the latest version of XOOPS, when new fixed version becomes available from the XOOPS Download Web site at http://www.xoops.org/modules/core/

-- OR --

As a workaround, enable PHP's 'magic_quotes_gpc' setting and disable its 'register_globals' setting.
Related URL CVE-2005-3680 (CVE)
Related URL 15406 (SecurityFocus)
Related URL 23145,23147 (ISS)