Persism.Content.Management.System.PHP.File.Inclusion

description-logoDescription

Persism CMS has multiple remote file include vulnerabilities. A remote attacker could execute an arbitrary script on a vulnerable web server with the privileges of the server. The vulnerability can be exploited via a specially crafted URL request to "modules/blocks/headerfile.php", "modules/files/blocks/latest_files.php", "modules/filters/headerfile.php", "modules/forums/blocks/latest_posts.php", "modules/groups/headerfile.php", "modules/links/blocks/links.php", "modules/menu/headerfile.php", "modules/news/blocks/latest_news.php", "modules/settings/headerfile.php" or "modules/users/headerfile.php" using the 'system[path]' parameter to specify a malicious PHP file from a remote system.

affected-products-logoAffected Products

Persism CMS version 0.9.3 and prior.

Impact logoImpact

System compromise.

recomended-action-logoRecommended Actions

Currently we are not aware of any official supplied fix for this issue.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)