VID |
21926 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Geeklog application is vulnerable to a remote file include vulnerability via the '_CONF[path]' parameter. Geeklog, also known as Weblog, is a PHP/MySQL based application for managing dynamic web contents. Geeklog version 1.4.0sr3 and earlier versions are vulnerable to multiple remote file include vulnerabilities, caused by improper validation of user-supplied input passed to the '_CONF[path]' parameter of the several scripts. A remote attacker could send a specially-crafted URL request to execute arbitrary PHP code and operating system commands on the affected host.
* References: http://www.milw0rm.com/exploits/1963 http://www.geeklog.net/article.php/so-called-exploit
* Platforms Affected: Geeklog 1.4.0sr3 and earlier versions Any operating system Any version |
Recommendation |
Upgrade to the latest version of Geeklog (1.4.0sr4 or later), available from the Geeklog Web site at http://www.geeklog.net/filemgmt/index.php?id=727 |
Related URL |
CVE-2006-3362 (CVE) |
Related URL |
18740 (SecurityFocus) |
Related URL |
27469 (ISS) |
|