![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.20972 |
Categoría: | Web application abuses |
Título: | Plume CMS <= 1.0.2 Remote File Inclusion Vulnerability |
Resumen: | Plume CMS is prone to local and remote file inclusion vulnerabilities. |
Descripción: | Summary: Plume CMS is prone to local and remote file inclusion vulnerabilities. Vulnerability Insight: The version installed does not sanitize user input in the '_PX_config[manager_path]' parameter in the 'prepend.php' file. This allows an attacker to include arbitrary files and execute code on the system. This flaw is exploitable if PHP's register_globals is enabled. Solution: Either sanitize the prepend.php file as advised by the developer (see references) or update to Plume CMS version 1.0.3 or later. CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2006-0725 BugTraq ID: 16662 http://www.securityfocus.com/bid/16662 http://www.osvdb.org/23204 http://securitytracker.com/id?1015624 http://secunia.com/advisories/18883 http://www.vupen.com/english/advisories/2006/0599 XForce ISS Database: plumecms-frontinc-prepend-file-include(27699) https://exchange.xforce.ibmcloud.com/vulnerabilities/27699 XForce ISS Database: plumecms-prepend-file-include(24697) https://exchange.xforce.ibmcloud.com/vulnerabilities/24697 |
Copyright | Copyright (C) 2006 Ferdy Riphagen |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |