Korean
<< Back
VID 21987
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Exponent CMS is vulnerable to a local file include vulnerability via the 'view' parameter. Exponent CMS is an open-source Web-based Content Management System (CMS) written in PHP. Exponent version 0.96.3 and earlier versions are vulnerable to a local file include vulnerability, caused by improper validation of user-supplied input passed to the 'view' parameter of the 'index.php' script. Regardless of PHP's 'magic_quotes_gpc' and 'register_globals' settings, a remote attacker could exploit this vulnerability to view arbitrary files or to execute arbitrary PHP script code on the vulnerable system in the security context of the Web server process.

* References:
http://www.exponentcms.org/index.php?action=view&id=35&module=newsmodule
http://milw0rm.com/exploits/2391
http://www.frsirt.com/english/advisories/2006/3708
http://secunia.com/advisories/22003

* Platforms Affected:
James Hunt and the OIC Group, Inc., Exponent CMS version 0.96.3 and earlier versions
Any operating system Any version
Recommendation Apply the patch for version 96.3, as described in the vendor's advisory at http://www.exponentcms.org/index.php?action=view&id=35&module=newsmodule
Related URL CVE-2006-4963 (CVE)
Related URL 20111 (SecurityFocus)
Related URL 29077 (ISS)