Check Point Reference: | CPAI-2006-126 |
Date Published: | 13 Nov 2006 |
Severity: | High |
Last Updated: | Tuesday 15 May, 2007 |
Source: | FrSIRT/ADV-2006-3493 |
Industry Reference: | CVE-2006-4644 |
Protection Provided by: | |
Who is Vulnerable? | phpFullAnnu version 5.1 and prior |
Vulnerability Description | phpFullAnnu, a content management system portal application, is prone to a remote file inclusion vulnerability. An attacker can exploit this vulnerability to execute arbitrary PHP code on an affected system via a maliciously crafted URL in the 'repmod' parameter. |
Vulnerability Details | The vulnerability is due to input validation errors in the 'modules/home.module.php' script that does not validate the 'repmod' parameter prior to including files. A remote attacker could exploit this flaw via a specially crafted URL. By doing so, the attacker could include malicious scripts and execute arbitrary commands on the vulnerable system. |