RETIRED: Ariadne CMS Remote File Include Vulnerability
BID:13206
Info
RETIRED: Ariadne CMS Remote File Include Vulnerability
| Bugtraq ID: | 13206 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 16 2005 12:00AM |
| Updated: | Oct 19 2006 05:53PM |
| Credit: | "Fidel Costa" <[email protected]> is credited with the discovery of this issue. |
| Vulnerable: |
Ariadne Ariadne CMS 2.4 |
| Not Vulnerable: | |
Discussion
RETIRED: Ariadne CMS Remote File Include Vulnerability
A remote file include vulnerability affects Ariadne CMS. This issue is due to a failure of the application to validate critical parameters before using them in a 'require_once()' function call.
An attacker may leverage this issue to execute arbitrary server-side script code on an affected computer with the privileges of the Web server process. This may facilitate unauthorized access.
UPDATE: This BID is being retired due to further information which shows the application is not vulnerable to this issue.
A remote file include vulnerability affects Ariadne CMS. This issue is due to a failure of the application to validate critical parameters before using them in a 'require_once()' function call.
An attacker may leverage this issue to execute arbitrary server-side script code on an affected computer with the privileges of the Web server process. This may facilitate unauthorized access.
UPDATE: This BID is being retired due to further information which shows the application is not vulnerable to this issue.
Exploit / POC
RETIRED: Ariadne CMS Remote File Include Vulnerability
This issue can be exploited via a web client.
The following proof of concept is available:
This issue can be exploited via a web client.
The following proof of concept is available:
Solution / Fix
RETIRED: Ariadne CMS Remote File Include Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.