Jupiter CMS 1.1.5 - index.php Remote File Inclusion

ID EXPLOITPACK:9789984B37556084E00F6D1D2480C3E0
Type exploitpack
Reporter D3nGeR
Modified 2006-08-26T00:00:00


Jupiter CMS 1.1.5 - index.php Remote File Inclusion

                                            source: https://www.securityfocus.com/bid/19721/info

Jupiter CMS is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input.

An attacker can exploit this issue to include arbitrary remote files containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and to gain access to the underlying system.

Version 1.1.5 is vulnerable to this issue; other versions may also be affected.

This BID has been retired.

http://www.example.com/path/index.php?template=[Evil Code]