Korean
<< Back
VID 21908
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Nucleus CMS is vulnerable to a remote file include vulnerability via the 'DIR_LIBS' variable. Nucleus CMS is an open-source content management system written by PHP. Nucleus CMS version 3.22 and earlier versions are vulnerable to a remote file include vulnerability, caused by improper validation of user-supplied input passed to the 'GLOBALS[DIR_LIBS]' parameter of the 'nucleus/libs/PLUGINADMIN.php' script. If the register_globals is enabled, a remote attacker could send a specially-crafted URL request to execute arbitrary PHP code and operating system commands on the affected host.

* References:
http://www.securityfocus.com/archive/1/434837/30/0/threaded
http://www.nucleuscms.org/item/3038
http://www.milw0rm.com/exploits/1816

* Platforms Affected:
The Nucleus Group, Nucleus CMS version 3.22 and earlier versions
Any operating system Any version
Recommendation Upgrade to the latest version of Nucleus CMS (3.23 or later), available from the Nucleus Group Download Web site at http://nucleuscms.org/download.php
Related URL CVE-2006-2583 (CVE)
Related URL 18097 (SecurityFocus)
Related URL 26606 (ISS)