Korean
<< Back
VID 21776
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Mambo Open Source is vulnerable to a remote file include vulnerability via the globals.php script. Mambo Open Source (formerly Mambo Site Server) is an Internet portal and content management software. Mambo Open Source version 4.5.2.3 and earlier versions could allow a remote attacker to include malicious PHP files, caused by improper validation of user-supplied input passed to the "mosConfig_absolute_path" parameter of the "globals.php" script. If the register_globals setting is set to 'on', this vulnerability can be exploited. A remote attacker can send a specially-crafted URL request to execute arbitrary PHP code and operating system commands on the target system.

* References:
http://www.frsirt.com/english/advisories/2005/2473
http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0520.html
http://secunia.com/advisories/17622/

* Platforms Affected:
Miro International Pty Ltd., Mambo Open Source version 4.5.2.3 and earlier versions
Any operating system Any version
Recommendation Apply the patch for this vulnerability, available from the MamboForge Web site at http://sourceforge.net/projects/mambo/
Related URL CVE-2005-3738 (CVE)
Related URL 15461 (SecurityFocus)
Related URL 23146 (ISS)