vendor:
Pacer Edition CMS
by:
Gjoko 'LiquidWorm' Krstic
7.5
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: Pacer Edition CMS
Affected Version From: RC 2.1 (SVN: 867)
Affected Version To: RC 2.1 (SVN: 867)
Patch Exists: YES
Related CWE: N/A
CPE: a:the_pacer_edition:pacer_edition_cms:2.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Microsoft Windows XP Professional SP3 (EN), Apache 2.2.14 (Win32), PHP 5.3.1, MySQL 5.1.41
2011
Pacer Edition CMS 2.1 (l param) Local File Inclusion Vulnerability
Pacer Edition CMS suffers from a local file inlcusion vulnerability when input passed thru the 'l' parameter to admin/login/forgot/index.php script is not properly verified before being used to include files. This can be exploited to include files from local resources with directory traversal attacks and URL encoded NULL bytes.
Mitigation:
Input validation should be performed to verify that the input is of the expected type, length, and value.