VID |
21994 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Limbo CMS is vulnerable to a remote code execution vulnerability in the fm component (com_fm). Limbo CMS is a content-management system (CMS) written in PHP. Limbo CMS version 1.0.4.2 and earlier versions are vulnerable to a remote code execution vulnerability, caused by improper validation of user-supplied input passed to the 'fm.install.php' or 'fm.install.php' script. By sending a specially-crafted URL request to the 'admin/components/com_fm/fm.install.php' or 'components/com_fm/fm.install.php' script using the 'lm_absolute_path' or 'install_dir parameter' in the com_fm component to specify a malicious file from the remote system, a remote attacker could obtain sensitive information and execute arbitrary code on the affected system.
* References: http://www.securityfocus.com/archive/1/446142/30/0/threaded http://secunia.com/advisories/21944/ http://www.frsirt.com/english/advisories/2006/3663
* Platforms Affected: Limbo CMS version 1.0.4.2 and earlier versions Any operating system Any version |
Recommendation |
No upgrade or patch available as of Oct 2006.
Upgrade to a version of Limbo CMS greater than 1.0.4.2, when new fixed version becomes available from the Limbo CMS Web site at http://www.limbo-cms.com/ |
Related URL |
CVE-2006-4859 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
29000 (ISS) |
|