Multiple PHP remote file inclusion vulnerabilities in Contenido CMS 4.8.4 allow remote attackers to execute arbitrary PHP code via a URL in the (1) contenido_path parameter to (a) contenido/backend_search.php; the (2) cfg[path][contenido] parameter to (b) move_articles.php, (c) move_old_stats.php, (d) optimize_database.php, (e) run_newsletter_job.php, (f) send_reminder.php, (g) session_cleanup.php, and (h) setfrontenduserstate.php in contenido/cronjobs/, and (i) includes/include.newsletter_jobs_subnav.php and (j) plugins/content_allocation/includes/include.right_top.php in contenido/; the (3) cfg[path][templates] parameter to (k) includes/include.newsletter_jobs_subnav.php and (l) plugins/content_allocation/includes/include.right_top.php in contenido/; and the (4) cfg[templates][right_top_blank] parameter to (m) plugins/content_allocation/includes/include.right_top.php and (n) contenido/includes/include.newsletter_jobs_subnav.php in contenido/, different vectors than CVE-2006-5380.
References
Link | Resource |
---|---|
http://secunia.com/advisories/30683 | Vendor Advisory |
http://www.securityfocus.com/bid/29719 | Exploit Patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/43103 | |
https://www.exploit-db.com/exploits/5810 |
Configurations
History
No history.
Information
Published : 2008-06-30 18:24
Updated : 2024-02-04 17:33
NVD link : CVE-2008-2912
Mitre link : CVE-2008-2912
CVE.ORG link : CVE-2008-2912
JSON object : View
Products Affected
contenido
- contenido_cms
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')