Description
PHP remote file inclusion vulnerability in ModuleBased CMS Pre-Alpha allows remote attackers to execute arbitrary PHP code via the _SERVER parameter in (1) admin/avatar.php, (2) libs/archive.class.php, (3) libs/login.php, (4) libs/profiles.class.php, and (5) libs/profile/proccess.php. NOTE: CVE disputes this claim, as the _SERVER array and the _SERVER[DOCUMENT_ROOT] index are controlled by PHP and cannot be manipulated by an attacker
Exploits (1)
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/444897/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/29872
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/445006/100/100/threaded
Exploit mailing-list
x_refsource_vim
http://www.attrition.org/pipermail/vim/2006-September/001012.html
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/19754
Scores
EPSS
0.0624
EPSS Percentile
91.0%
Details
Status
published
Products (1)
modulebased_cms/modulebased_cms
pre-alpha
Published
Sep 06, 2006
Tracked Since
Feb 18, 2026