Multiple PHP remote file inclusion vulnerabilities in Nova CMS allow remote attackers to execute arbitrary PHP code via a URL in the (1) fileType parameter to optimizer/index.php, (2) id parameter to administrator/modules/moduleslist.php, (3) filename parameter to includes/function/gets.php, or (4) conf[blockfile] parameter to includes/function/usertpl.php.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://packetstormsecurity.org/files/109669/Nova-CMS-Remote-File-Inclusion.html | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/73159 | vdb entry |
http://www.securityfocus.com/bid/51976 | vdb entry exploit |