Persism.Content.Management.System.PHP.File.Inclusion
Description
Persism CMS has multiple remote file include vulnerabilities. A remote attacker could execute an arbitrary script on a vulnerable web server with the privileges of the server. The vulnerability can be exploited via a specially crafted URL request to "modules/blocks/headerfile.php", "modules/files/blocks/latest_files.php", "modules/filters/headerfile.php", "modules/forums/blocks/latest_posts.php", "modules/groups/headerfile.php", "modules/links/blocks/links.php", "modules/menu/headerfile.php", "modules/news/blocks/latest_news.php", "modules/settings/headerfile.php" or "modules/users/headerfile.php" using the 'system[path]' parameter to specify a malicious PHP file from a remote system.
Affected Products
Persism CMS version 0.9.3 and prior.
Impact
System compromise.
Recommended Actions
Currently we are not aware of any official supplied fix for this issue.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |