VID |
21987 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Exponent CMS is vulnerable to a local file include vulnerability via the 'view' parameter. Exponent CMS is an open-source Web-based Content Management System (CMS) written in PHP. Exponent version 0.96.3 and earlier versions are vulnerable to a local file include vulnerability, caused by improper validation of user-supplied input passed to the 'view' parameter of the 'index.php' script. Regardless of PHP's 'magic_quotes_gpc' and 'register_globals' settings, a remote attacker could exploit this vulnerability to view arbitrary files or to execute arbitrary PHP script code on the vulnerable system in the security context of the Web server process.
* References: http://www.exponentcms.org/index.php?action=view&id=35&module=newsmodule http://milw0rm.com/exploits/2391 http://www.frsirt.com/english/advisories/2006/3708 http://secunia.com/advisories/22003
* Platforms Affected: James Hunt and the OIC Group, Inc., Exponent CMS version 0.96.3 and earlier versions Any operating system Any version |
Recommendation |
Apply the patch for version 96.3, as described in the vendor's advisory at http://www.exponentcms.org/index.php?action=view&id=35&module=newsmodule |
Related URL |
CVE-2006-4963 (CVE) |
Related URL |
20111 (SecurityFocus) |
Related URL |
29077 (ISS) |
|