vendor:
CMSimple
by:
NoGe
9,3
CVSS
HIGH
Remote File Inclusion
98
CWE
Product Name: CMSimple
Affected Version From: 4.4
Affected Version To: 4.4.2
Patch Exists: No
Related CWE: N/A
CPE: a:cmsimple:cmsimple
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2014
CMSimple – Open Source CMS with no database <= Remote File Inclusion Vulnerability
CMSimple is a php based Content Managemant System (CMS), which requires no database. All data are stored in a simple file system. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server, which includes a URL in the 'pth[folder][plugin]' parameter. This can allow the attacker to include a remote file containing arbitrary code, which will be executed by the vulnerable server.
Mitigation:
The best way to mitigate this vulnerability is to ensure that user input is properly sanitized and validated before being used in any file operations. Additionally, the application should be configured to only allow access to files from trusted sources.