vendor:
Ottoman Content Management System
by:
Jacek Wlodarczyk (j4ck)
7,5
CVSS
HIGH
Remote File Inclusion
94
CWE
Product Name: Ottoman Content Management System
Affected Version From: 1.1.3 and prior
Affected Version To: 1.1.3 and prior
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
Ottoman CMS <= 1.1.3 Remote File Inclusion Exploit
Input passed to the 'default_path' parameter in 'index.php', 'error.php', 'classes/main_class.php', 'format_css.php', 'js.php', and 'rss.php' is not properly sanitized before being used to include files. Vulnerable scripts not properly sanitizing user-supplied input to the 'POST' and 'COOKIE' variables. This can be exploited to execute arbitrary PHP code by including files from local or external resources. Exploitation requires turn ON 'register_globals'.
Mitigation:
Input validation should be used to prevent the exploitation of this vulnerability.