VID |
21993 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Limbo CMS is vulnerable to an arbitrary file upload vulnerability in the contact component (com_contact). Limbo CMS is a content-management system (CMS) written in PHP. Limbo CMS version 1.0.4.2L and earlier versions could allow a remote attacker to send a specially-crafted URL request to the contact.html.php script in the com_contact component to upload arbitrary files. If the 'file_uploads' is enabled, a remote attacker could exploit this vulnerability to upload arbitrary PHP files and execute arbitrary code on the affected system.
* References: http://www.milw0rm.com/exploits/2370 http://www.limbo-cms.com/
* Platforms Affected: Limbo CMS version 1.0.4.2L and earlier versions Any operating system Any version |
Recommendation |
No upgrade or patch available as of Oct 2006.
Upgrade to a version of Limbo CMS greater than 1.0.4.2L, when new fixed version becomes available from the Limbo CMS Web site at http://www.limbo-cms.com/
As a workaround, disable PHP's 'file_uploads' setting. |
Related URL |
CVE-2006-4859 (CVE) |
Related URL |
20044 (SecurityFocus) |
Related URL |
28968 (ISS) |
|