Korean
<< Back
VID 21903
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The phpwcms software is vulnerable to a local file include vulnerability in the 'spaw_control.class.php' script. phpwcms is a freely available Content Management System (CMS) written in PHP. phpwcms version 1.2.6 and earlier versions are vulnerable to a local file include vulnerability, caused by improper validation of user-supplied input passed to the 'spaw_root' parameter of the 'include/inc_ext/spaw/spaw_control.class.php' script. If 'register_globals' setting is enabled, a remote attacker could exploit this vulnerability to view arbitrary files or to execute arbitrary PHP script code on the vulnerable system in the security context of the Web server process.

* References:
http://www.securityfocus.com/archive/1/434706/30/0/threaded
http://secunia.com/advisories/20239

* Platforms Affected:
phpwcms version 1.2.6 and earlier versions
Any operating system Any version
Recommendation No upgrade or patch available as of June 2006.

Upgrade to a version of phpwcms greater than 1.2.6, when new fixed version becomes available from the SourceForge.net Download Web site at http://sourceforge.net/project/showfiles.php?group_id=94396

As a workaround, disable PHP's 'register_globals' setting.
Related URL CVE-2006-2519 (CVE)
Related URL 18062 (SecurityFocus)
Related URL 26639 (ISS)