| VID |
21901 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The XOOPS program is vulnerable to a local file inclusion vulnerability which exists in versions 2.0.13.2 and earlier. XOOPS is a dynamic object oriented based open source portal system written in PHP. XOOPS version 2.0.13.2 and earlier versions could allow a remote attacker to include malicious PHP files, caused by improper validation of user-supplied input passed to the "xoopsConfig" array parameter when the "xoopsOption[nocommon]" parameter is defined. A remote attacker could exploit this vulnerability to read arbitrary local files and even execute arbitrary PHP code on the target system. Successful exploitation requires that PHP's 'register_globals' setting be enabled and possibly that 'magic_quotes_gpc' be disabled.
* References: http://www.securityfocus.com/archive/1/434698/30/0/threaded http://www.frsirt.com/english/advisories/2006/1895 http://secunia.com/advisories/20176 http://milw0rm.com/exploits/1811
* Platforms Affected: XOOPS version 2.0.13.2 and earlier versions Any operating system Any version |
| Recommendation |
Apply the patch for this vulnerability, available from the XOOPS Web site at http://www.xoops.org/modules/news/article.php?storyid=3112
-- OR --
As a workaround, enable PHP's 'magic_quotes_gpc' setting and disable its 'register_globals' setting. |
| Related URL |
CVE-2006-2516 (CVE) |
| Related URL |
18061 (SecurityFocus) |
| Related URL |
(ISS) |
|