Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: CGI abuses --> Category: attack

CMS Made Simple nls Parameter File Include Vulnerability Vulnerability Scan


Vulnerability Scan Summary
Checks for nls parameter file include vulnerability in CMS Made Simple

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a PHP script that is vulnerable to
remote file include attacks.

Description :

The remote host appears to be running CMS Made Simple, a content
management system written in PHP.

The version of CMS Made Simple installed on the remote host fails to
properly sanitize user-supplied input to the 'nls' parameter of the
'admin/lang.php' script before using it to include PHP code. By
leveraging this flaw, a possible hacker may be able to view arbitrary files
on the remote host and execute arbitrary PHP code, possibly taken from
third-party hosts.

See also :

http://www.securityfocus.com/archive/1/409654
http://forum.cmsmadesimple.org/index.php/topic,1554.0.html

Solution :

Upgrade to CMS Made Simple 0.10.1 or later.

Threat Level:

Medium / CVSS Base Score : 6
(AV:R/AC:H/Au:NR/C:P/A:P/I:P/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.