VID |
21974 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The e107 Website System is vulnerable to a remote code execution vulnerability via the 'e107_handlers/tiny_mce/plugins/ibrowser/ibrowser.php' script. e107 is a freely available, Web content management system written in PHP. PHP versions 4.0 through 4.4.0 and 5.0 through 5.0.5 could allow a remote attacker to execute arbitrary PHP code on the affected system, caused by a vulnerability in the 'ibrowser.php' script or extract() or import_request_variables() function. If the register_globals is enabled, a remote attacker could send a multipart/form-data POST request with a 'GLOBALS' fileupload field to execute arbitrary PHP code on a affected system.
* References: http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0647.html http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0934.html http://www.gentoo.org/security/en/glsa/glsa-200511-08.xml https://rhn.redhat.com/errata/RHSA-2005-831.html https://rhn.redhat.com/errata/RHSA-2005-838.html http://secunia.com/advisories/17371/ http://www.frsirt.com/english/advisories/2005/2254 http://www.securityfocus.com/archive/1/archive/1/415290/30/0/threaded
* Platforms Affected: PHP versions 4.0 through 4.4.0 PHP versions 5.0 through 5.0.5 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PHP (4.4.3 or later, or 5.1.4 or later), available from the PHP Web site at http://www.php.net/downloads.php |
Related URL |
CVE-2005-3390,CVE-2006-3017 (CVE) |
Related URL |
15250,17843 (SecurityFocus) |
Related URL |
22920 (ISS) |
|