VID |
21903 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The phpwcms software is vulnerable to a local file include vulnerability in the 'spaw_control.class.php' script. phpwcms is a freely available Content Management System (CMS) written in PHP. phpwcms version 1.2.6 and earlier versions are vulnerable to a local file include vulnerability, caused by improper validation of user-supplied input passed to the 'spaw_root' parameter of the 'include/inc_ext/spaw/spaw_control.class.php' script. If 'register_globals' setting is enabled, a remote attacker could exploit this vulnerability to view arbitrary files or to execute arbitrary PHP script code on the vulnerable system in the security context of the Web server process.
* References: http://www.securityfocus.com/archive/1/434706/30/0/threaded http://secunia.com/advisories/20239
* Platforms Affected: phpwcms version 1.2.6 and earlier versions Any operating system Any version |
Recommendation |
No upgrade or patch available as of June 2006.
Upgrade to a version of phpwcms greater than 1.2.6, when new fixed version becomes available from the SourceForge.net Download Web site at http://sourceforge.net/project/showfiles.php?group_id=94396
As a workaround, disable PHP's 'register_globals' setting. |
Related URL |
CVE-2006-2519 (CVE) |
Related URL |
18062 (SecurityFocus) |
Related URL |
26639 (ISS) |
|