| VID |
21926 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The Geeklog application is vulnerable to a remote file include vulnerability via the '_CONF[path]' parameter. Geeklog, also known as Weblog, is a PHP/MySQL based application for managing dynamic web contents. Geeklog version 1.4.0sr3 and earlier versions are vulnerable to multiple remote file include vulnerabilities, caused by improper validation of user-supplied input passed to the '_CONF[path]' parameter of the several scripts. A remote attacker could send a specially-crafted URL request to execute arbitrary PHP code and operating system commands on the affected host.
* References: http://www.milw0rm.com/exploits/1963 http://www.geeklog.net/article.php/so-called-exploit
* Platforms Affected: Geeklog 1.4.0sr3 and earlier versions Any operating system Any version |
| Recommendation |
Upgrade to the latest version of Geeklog (1.4.0sr4 or later), available from the Geeklog Web site at http://www.geeklog.net/filemgmt/index.php?id=727 |
| Related URL |
CVE-2006-3362 (CVE) |
| Related URL |
18740 (SecurityFocus) |
| Related URL |
27469 (ISS) |
|