Xcms Password Parameter Arbitrary PHP Code Execution Vulnerability
BID:25771
Info
Xcms Password Parameter Arbitrary PHP Code Execution Vulnerability
| Bugtraq ID: | 25771 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-5060 |
| Remote: | Yes |
| Local: | No |
| Published: | Sep 22 2007 12:00AM |
| Updated: | May 07 2015 05:35PM |
| Credit: | x0kster is credited with the discovery of this vulnerability. |
| Vulnerable: |
XCMS XCMS 1.7 XCMS XCMS 1.1 |
| Not Vulnerable: | |
Discussion
Xcms Password Parameter Arbitrary PHP Code Execution Vulnerability
Xcms is prone to a vulnerability that lets attackers execute arbitrary PHP code because the application fails to properly sanitize user-supplied input.
An attacker can exploit this issue to execute arbitrary malicious PHP code in the context of the webserver process. This may help the attacker compromise the application and the underlying system; other attacks are also possible.
Xcms is prone to a vulnerability that lets attackers execute arbitrary PHP code because the application fails to properly sanitize user-supplied input.
An attacker can exploit this issue to execute arbitrary malicious PHP code in the context of the webserver process. This may help the attacker compromise the application and the underlying system; other attacks are also possible.
Exploit / POC
Xcms Password Parameter Arbitrary PHP Code Execution Vulnerability
Attackers can use a browser to exploit this issue.
A sample proof of concept is available:
Attackers can use a browser to exploit this issue.
A sample proof of concept is available:
Solution / Fix
Xcms Password Parameter Arbitrary PHP Code Execution Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].