vendor:
Xomol CMS
by:
DNX
7.5
CVSS
HIGH
Login Bypass & LFI
20
CWE
Product Name: Xomol CMS
Affected Version From: v1
Affected Version To: v1
Patch Exists: YES
Related CWE: N/A
CPE: a:xomol:xomol_cms
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
Xomol CMS v1 Login Bypass & LFI
Xomol CMS is a content management system based on PHP and MySQL. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'email' and 'password' parameters of the 'index.php' script, which can be exploited to bypass authentication and gain administrative access. Additionally, the vulnerability is caused due to insufficient sanitization of user-supplied input in the 'op' parameter of the 'index.php' script, which can be exploited to include arbitrary files from local resources. This can be exploited to disclose sensitive information.
Mitigation:
Input validation should be used to ensure that untrusted data is not used to bypass authentication or to include arbitrary files from local resources.