vendor:
CMS Faethon
by:
eidelweiss
7,5
CVSS
HIGH
Local File Inclusion (LFI)
98
CWE
Product Name: CMS Faethon
Affected Version From: CMS Faethon 1.3 (CMS Faethon 1.3-Ultimed to cmsfaethon-1.3.5-ultimate.7z)
Affected Version To: CMS Faethon 2.2.0 Ultimate
Patch Exists: NO
Related CWE: N/A
CPE: a:cmsfaethon:cms_faethon:2.2.0-ultimate.7z
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010
cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability
CMS Faethon is content management system for different web pages. It is vulnerable to Local File Inclusion (LFI) vulnerability due to improper validation of user-supplied input. An attacker can exploit this vulnerability to include malicious files from the local system and execute arbitrary code on the vulnerable system.
Mitigation:
Input validation should be done properly to prevent LFI attacks. Also, access to the vulnerable files should be restricted.