From b9d04f15a9b458f6350a247835672612bd359e98 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Tue, 5 Jul 2022 14:07:22 -0400 Subject: [PATCH] Enhancement: cves/2008/CVE-2008-2650.yaml by mp --- cves/2008/CVE-2008-2650.yaml | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/cves/2008/CVE-2008-2650.yaml b/cves/2008/CVE-2008-2650.yaml index 8c9993234f..a3749822b2 100644 --- a/cves/2008/CVE-2008-2650.yaml +++ b/cves/2008/CVE-2008-2650.yaml @@ -5,11 +5,12 @@ info: author: pussycat0x severity: high description: | - Directory traversal vulnerability in cmsimple/cms.php in CMSimple 3.1, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the sl parameter to index.php. NOTE: this can be leveraged for remote file execution by including adm.php and then invoking the upload action. NOTE: on 20080601, the vendor patched 3.1 without changing the version number. + CMSimple 3.1 is susceptible to local file inclusion via cmsimple/cms.php when register_globals is enabled, which allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the sl parameter to index.php. NOTE: this can be leveraged for remote file execution by including adm.php and then invoking the upload action. NOTE: on 20080601, the vendor patched 3.1 without changing the version number. reference: - http://www.cmsimple.com/forum/viewtopic.php?f=2&t=17 - http://web.archive.org/web/20210121182016/https://www.securityfocus.com/bid/29450/ - http://web.archive.org/web/20140729144732/http://secunia.com:80/advisories/30463 + - https://nvd.nist.gov/vuln/detail/CVE-2008-2650 classification: cve-id: CVE-2008-2650 tags: cve,cve2008,lfi @@ -30,3 +31,5 @@ requests: regex: - "root:.*:0:0:" part: body + +# Enhanced by mp on 2022/07/05