vendor:
Geeklog
by:
rgod
9,3
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: Geeklog
Affected Version From: 1.*
Affected Version To: 1.*
Patch Exists: YES
Related CWE: N/A
CPE: a:geeklog:geeklog
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: All
2005
Geeklog 1.* remote commands execution
This exploit allows an attacker to execute arbitrary commands on a vulnerable Geeklog 1.* installation. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'loginname' and 'passwd' parameters of the 'users.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with a malicious PHP code in the 'gl_session' cookie. This will cause the vulnerable script to execute arbitrary commands with the privileges of the web server.
Mitigation:
Upgrade to the latest version of Geeklog 1.*