Korean
<< Back
VID 21926
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Geeklog application is vulnerable to a remote file include vulnerability via the '_CONF[path]' parameter. Geeklog, also known as Weblog, is a PHP/MySQL based application for managing dynamic web contents. Geeklog version 1.4.0sr3 and earlier versions are vulnerable to multiple remote file include vulnerabilities, caused by improper validation of user-supplied input passed to the '_CONF[path]' parameter of the several scripts. A remote attacker could send a specially-crafted URL request to execute arbitrary PHP code and operating system commands on the affected host.

* References:
http://www.milw0rm.com/exploits/1963
http://www.geeklog.net/article.php/so-called-exploit

* Platforms Affected:
Geeklog 1.4.0sr3 and earlier versions
Any operating system Any version
Recommendation Upgrade to the latest version of Geeklog (1.4.0sr4 or later), available from the Geeklog Web site at http://www.geeklog.net/filemgmt/index.php?id=727
Related URL CVE-2006-3362 (CVE)
Related URL 18740 (SecurityFocus)
Related URL 27469 (ISS)