dev/less.php in Family Connections CMS (FCMS) 2.5.0 - 2.7.1, when register_globals is enabled, allows remote attackers to execute arbitrary commands via shell metacharacters in the argv[1] parameter.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://secunia.com/advisories/47069 | third party advisory vendor advisory |
http://sourceforge.net/apps/trac/fam-connections/ticket/407 | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/71618 | vdb entry |
http://www.exploit-db.com/exploits/18198 | exploit |
http://www.exploit-db.com/exploits/18208 | exploit |
https://www.familycms.com/blog/2011/11/security-vulnerability-fcms-2-5-2-7-1/ | vendor advisory |
http://osvdb.org/77492 | vdb entry |