| VID |
21908 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The Nucleus CMS is vulnerable to a remote file include vulnerability via the 'DIR_LIBS' variable. Nucleus CMS is an open-source content management system written by PHP. Nucleus CMS version 3.22 and earlier versions are vulnerable to a remote file include vulnerability, caused by improper validation of user-supplied input passed to the 'GLOBALS[DIR_LIBS]' parameter of the 'nucleus/libs/PLUGINADMIN.php' script. If the register_globals is enabled, a remote attacker could send a specially-crafted URL request to execute arbitrary PHP code and operating system commands on the affected host.
* References: http://www.securityfocus.com/archive/1/434837/30/0/threaded http://www.nucleuscms.org/item/3038 http://www.milw0rm.com/exploits/1816
* Platforms Affected: The Nucleus Group, Nucleus CMS version 3.22 and earlier versions Any operating system Any version |
| Recommendation |
Upgrade to the latest version of Nucleus CMS (3.23 or later), available from the Nucleus Group Download Web site at http://nucleuscms.org/download.php |
| Related URL |
CVE-2006-2583 (CVE) |
| Related URL |
18097 (SecurityFocus) |
| Related URL |
26606 (ISS) |
|