CVE-2007-0635

EncapsCMS 0.3.6 - Remote File Inclusion via config[path] or config[theme] Parameter

Title source: llm
STIX 2.1

Description

Multiple PHP remote file inclusion vulnerabilities in EncapsCMS 0.3.6 allow remote attackers to execute arbitrary PHP code via a URL in the (1) config[path] parameter to (a) common_foot.php or (b) blogs.php, or (2) the config[theme] parameter to (c) admin/gallery_head.php.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Tr_ZiNDaN · textwebappsphp
https://www.exploit-db.com/exploits/29539

References (9)

Core 9
Core References
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2007/0430
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/33035
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/33034
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/22319
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/23987
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/31978
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/2200
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/33036
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/458582/100/0/threaded

Scores

EPSS 0.0919
EPSS Percentile 92.8%

Details

Status published
Products (1)
encapscms/encapscms 0.3.6
Published Jan 31, 2007
Tracked Since Feb 18, 2026