vendor:
IPS Community Suite
by:
Anonymous
7,8
CVSS
HIGH
PHP Code Injection
94
CWE
Product Name: IPS Community Suite
Affected Version From: 4.1.12.3
Affected Version To: 4.1.12.3
Patch Exists: YES
Related CWE: CVE-2016-5195
CPE: a:invision_power_services:ips_community_suite
Metasploit:
https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2016-5195/, https://www.rapid7.com/db/vulnerabilities/panos-cve-2016-5195/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2016-5195/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2016-5195/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2016-5195/, https://www.rapid7.com/db/vulnerabilities/cisco-nx-os-cisco-sa-20161026-linux/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2016-5195/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2016-5195/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2016-5195/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2016-5195/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2016-5195/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2015-7852/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2015-7702/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2015-7701/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2015-5195/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2015-5219/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2015-7852/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2015-5195/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2015-7692/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2015-5219/, https://www.rapid7.com/db/?q=CVE-2016-5195&type=&page=2, https://www.rapid7.com/db/?q=CVE-2016-5195&type=&page=3, https://www.rapid7.com/db/?q=CVE-2016-5195&type=&page=2
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2016
IPS Community Suite <= 4.1.12.3 Autoloaded PHP Code Injection Vulnerability
The vulnerable code is located in the /applications/core/modules/front/system/content.php script. User input passed through the 'content_class' request parameter is not properly sanitized before being used in a call to the 'class_exists()' function at line 40. This could be exploited by unauthenticated attackers to inject and execute arbitrary PHP code leveraging the autoloading function defined into the /applications/cms/Application.php script. Successful exploitation of this vulnerability requires the application running on PHP before version 5.4.24 or 5.5.8.
Mitigation:
Update to version 4.1.13 or later.