CMS Made Simple 1.1.3.1 "eval()" Injection Vulnerability
Posted: Tue Sep 25, 2007 2:16 am
FYI.... New one popped up.
http://secunia.com/advisories/26928/
Description:
irk4z has discovered a vulnerability in CMS Made Simple, which can be exploited by malicious people to compromise a vulnerable system.
Input passed to the "last_module" parameter in lib/adodb_lite/adodb-perf-module.inc.php is not properly sanitised before being used in a call to "eval()". This can be exploited to inject and execute arbitrary PHP code via a specially crafted parameter value.
Successful exploitation requires that "register_globals" is enabled.
The vulnerability is confirmed in version 1.1.3.1. Other versions may also be affected.
John
http://secunia.com/advisories/26928/
Description:
irk4z has discovered a vulnerability in CMS Made Simple, which can be exploited by malicious people to compromise a vulnerable system.
Input passed to the "last_module" parameter in lib/adodb_lite/adodb-perf-module.inc.php is not properly sanitised before being used in a call to "eval()". This can be exploited to inject and execute arbitrary PHP code via a specially crafted parameter value.
Successful exploitation requires that "register_globals" is enabled.
The vulnerability is confirmed in version 1.1.3.1. Other versions may also be affected.
John