Multiple PHP remote file inclusion vulnerabilities in Plume CMS 1.0.6 and earlier allow remote attackers to execute arbitrary PHP code via the _PX_config[manager_path] parameter to (1) articles.php, (2) categories.php, (3) news.php, (4) prefs.php, (5) sites.php, (6) subtypes.php, (7) users.php, (8) xmedia.php, (9) frontinc/class.template.php, (10) inc/lib.text.php, (11) install/index.php, (12) install/upgrade.php, and (13) tools/htaccess/index.php. NOTE: other vectors are covered by CVE-2006-3562, CVE-2006-2645, and CVE-2006-0725.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.osvdb.org/31179 | vdb entry |
http://www.osvdb.org/31172 | vdb entry |
http://www.osvdb.org/31177 | vdb entry |
http://www.osvdb.org/31180 | vdb entry |
http://www.osvdb.org/31171 | vdb entry |
http://www.osvdb.org/31183 | vdb entry |
http://www.osvdb.org/31175 | vdb entry |
http://www.osvdb.org/31181 | vdb entry |
http://www.securityfocus.com/bid/19629 | vdb entry |
http://www.osvdb.org/31176 | vdb entry |
http://www.osvdb.org/31178 | vdb entry |
http://www.osvdb.org/31174 | vdb entry |
http://packetstormsecurity.org/0608-exploits/plume-1.0.6.txt | |
http://www.osvdb.org/31173 | vdb entry |
http://www.osvdb.org/31182 | vdb entry |