Plume CMS frontinc/class.template.php _PX_config[manager_path] Variable Remote File Inclusion

2006-08-27T12:52:38
ID OSVDB:31179
Type osvdb
Reporter Vagner Rodrigues Fernandes(vagner.rodrigues@gmail.com)
Modified 2006-08-27T12:52:38

Description

Vulnerability Description

Plume CMS contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to frontinc/class.template.php not properly sanitizing user input supplied to the '_PX_config[manager_path]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Plume CMS contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to frontinc/class.template.php not properly sanitizing user input supplied to the '_PX_config[manager_path]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

References:

Vendor URL: http://plume-cms.net/ Related OSVDB ID: 31176 Related OSVDB ID: 31177 Related OSVDB ID: 31180 Related OSVDB ID: 31181 Related OSVDB ID: 31182 Related OSVDB ID: 31171 Related OSVDB ID: 31178 Related OSVDB ID: 31183 Related OSVDB ID: 31172 Related OSVDB ID: 31173 Related OSVDB ID: 31174 Related OSVDB ID: 31175 Packet Storm: http://packetstormsecurity.org/0608-exploits/plume-1.0.6.txt CVE-2006-4533 Bugtraq ID: 19629