Korean
<< Back
VID 21974
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The e107 Website System is vulnerable to a remote code execution vulnerability via the 'e107_handlers/tiny_mce/plugins/ibrowser/ibrowser.php' script. e107 is a freely available, Web content management system written in PHP. PHP versions 4.0 through 4.4.0 and 5.0 through 5.0.5 could allow a remote attacker to execute arbitrary PHP code on the affected system, caused by a vulnerability in the 'ibrowser.php' script or extract() or import_request_variables() function. If the register_globals is enabled, a remote attacker could send a multipart/form-data POST request with a 'GLOBALS' fileupload field to execute arbitrary PHP code on a affected system.

* References:
http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0647.html
http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0934.html
http://www.gentoo.org/security/en/glsa/glsa-200511-08.xml
https://rhn.redhat.com/errata/RHSA-2005-831.html
https://rhn.redhat.com/errata/RHSA-2005-838.html
http://secunia.com/advisories/17371/
http://www.frsirt.com/english/advisories/2005/2254
http://www.securityfocus.com/archive/1/archive/1/415290/30/0/threaded

* Platforms Affected:
PHP versions 4.0 through 4.4.0
PHP versions 5.0 through 5.0.5
Any operating system Any version
Recommendation Upgrade to the latest version of PHP (4.4.3 or later, or 5.1.4 or later), available from the PHP Web site at http://www.php.net/downloads.php
Related URL CVE-2005-3390,CVE-2006-3017 (CVE)
Related URL 15250,17843 (SecurityFocus)
Related URL 22920 (ISS)