vendor:
XOOPS
by:
athos - staker[at]hotmail[dot]it
7.5
CVSS
HIGH
Remote Code Execution
Not specified
CWE
Product Name: XOOPS
Affected Version From: XOOPS 2.3.2
Affected Version To: XOOPS 2.3.2
Patch Exists: NO
Related CWE: Not specified
CPE: Not specified
Platforms Tested: Not specified
Not specified
XOOPS 2.3.2 Remote PHP Code Execution Exploit
This exploit allows remote attackers to execute arbitrary PHP code on a target system running XOOPS 2.3.2 with register globals enabled. The vulnerability exists in the onupdate.php, oninstall.php, and notification.php files in the xoops_lib/modules/protector/ directory. By sending a specially crafted request with a malicious PHP code as the 'mydirname' parameter, an attacker can execute arbitrary code on the target system.
Mitigation:
Upgrade to a version of XOOPS that is not affected by this vulnerability. Disable register globals if not needed.