vendor:
Tugux CMS
by:
Gjoko 'LiquidWorm' Krstic
7.5
CVSS
HIGH
Remote Arbitrary File Deletion
22
CWE
Product Name: Tugux CMS
Affected Version From: 1.2
Affected Version To: 1.2
Patch Exists: NO
Related CWE: N/A
CPE: a:tugux_studios:tugux_cms:1.2
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Microsoft Windows XP Professional SP3 (EN), Apache 2.2.14 (Win32), PHP 5.3.1, MySQL 5.1.41
2011
Tugux CMS 1.2 (pid) Remote Arbitrary File Deletion Vulnerability
Input passed to the 'pid' parameter in administrator/delete_page_parse.php is not properly sanitised before being used to delete files. This can be exploited to delete files with the permissions of the web server via directory traversal sequences passed within the 'pid' parameter.
Mitigation:
Input validation should be performed to ensure that arbitrary input is not passed to the 'pid' parameter.