Intrusion Prevention

1024CMS.Standard.PHP.File.Inclusion

Description

This indicates an attack attempt against a remote command-execution vulnerability in 1024 CMS.
A vulnerability has been reported in 1024 CMS that may allow an attacker to execute shell commands on a vulnerable system. This is possible because the user input filters fail to properly sanitize the php_include parameter value that is passed to "standard.php". An attacker may include shell commands by supplying an injection string through the URL.

Affected Products

1024 CMS 1.4.4 and prior versions

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Currently we are not aware of any patches supplied by the vendor for this issue.