VID |
21908 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Nucleus CMS is vulnerable to a remote file include vulnerability via the 'DIR_LIBS' variable. Nucleus CMS is an open-source content management system written by PHP. Nucleus CMS version 3.22 and earlier versions are vulnerable to a remote file include vulnerability, caused by improper validation of user-supplied input passed to the 'GLOBALS[DIR_LIBS]' parameter of the 'nucleus/libs/PLUGINADMIN.php' script. If the register_globals is enabled, a remote attacker could send a specially-crafted URL request to execute arbitrary PHP code and operating system commands on the affected host.
* References: http://www.securityfocus.com/archive/1/434837/30/0/threaded http://www.nucleuscms.org/item/3038 http://www.milw0rm.com/exploits/1816
* Platforms Affected: The Nucleus Group, Nucleus CMS version 3.22 and earlier versions Any operating system Any version |
Recommendation |
Upgrade to the latest version of Nucleus CMS (3.23 or later), available from the Nucleus Group Download Web site at http://nucleuscms.org/download.php |
Related URL |
CVE-2006-2583 (CVE) |
Related URL |
18097 (SecurityFocus) |
Related URL |
26606 (ISS) |
|