vendor:
S40 CMS
by:
Giovanni Buzzin
4.3
CVSS
MEDIUM
Local File Inclusion
98
CWE
Product Name: S40 CMS
Affected Version From: 0.4.2 Beta
Affected Version To: 0.4.2 Beta
Patch Exists: NO
Related CWE: N/A
CPE: a:awen_art_studio:s40_cms
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2001
S40 CMS 0.4.2 Beta Local File Inclusion
S40 CMS is prone to Local File Inclusion vulnerability because of poor security checks and bad input sanitization: GET variables are not properly sanitized before being included via require() PHP function. Having a quick look at page() function, the security issue is clear: $pid ($_GET['p']), is not sanitized or passed through a valid regular expression before being returned to require() function of index.php file.
Mitigation:
Input validation should be used to prevent the inclusion of malicious files. The application should validate all input data against a white list of allowed characters and reject any data that does not match the list.