Limbo CMS 1.0.4.2 and earlier, with register_globals off, does not protect the $_SERVER variable from external modification, which allows remote attackers to use the _SERVER[REMOTE_ADDR] parameter to (1) conduct cross-site scripting (XSS) attacks in the stats module or (2) execute arbitrary code via an eval injection attack in the wrapper option in index2.php.
References
Configurations
History
21 Nov 2024, 00:03
Type | Values Removed | Values Added |
---|---|---|
References | () http://rgod.altervista.org/limbo1042_xpl.html - Exploit, Vendor Advisory | |
References | () http://secunia.com/advisories/18063/ - Patch, Vendor Advisory | |
References | () http://securityreason.com/securityalert/255 - | |
References | () http://securitytracker.com/id?1015364 - Exploit | |
References | () http://www.osvdb.org/21754 - | |
References | () http://www.osvdb.org/21756 - | |
References | () http://www.securityfocus.com/archive/1/419470/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/15871/ - Exploit | |
References | () http://www.vupen.com/english/advisories/2005/2932 - |
Information
Published : 2005-12-17 11:03
Updated : 2024-11-21 00:03
NVD link : CVE-2005-4317
Mitre link : CVE-2005-4317
CVE.ORG link : CVE-2005-4317
JSON object : View
Products Affected
limbo_cms
- limbo_cms
CWE