Vulnerabilities > CVE-2006-2583 - Remote File Include vulnerability in Nucleus CMS GLOBALS[DIR_LIBS] Parameter

047910
CVSS 5.1 - MEDIUM
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
high complexity
nucleus-group
nessus
exploit available

Summary

PHP remote file inclusion vulnerability in nucleus/libs/PLUGINADMIN.php in Nucleus 3.22 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[DIR_LIBS] parameter.

Vulnerable Configurations

Part Description Count
Application
Nucleus_Group
1

Exploit-Db

descriptionNucleus CMS <= 3.22 (DIR_LIBS) Arbitrary Remote Inclusion Exploit. CVE-2006-2583. Webapps exploit for php platform
idEDB-ID:1816
last seen2016-01-31
modified2006-05-23
published2006-05-23
reporterrgod
sourcehttps://www.exploit-db.com/download/1816/
titleNucleus CMS <= 3.22 DIR_LIBS Arbitrary Remote Inclusion Exploit

Nessus

NASL familyCGI abuses
NASL idNUCLEUS_DIR_LIBS_FILE_INCLUDE.NASL
descriptionThe remote host is running Nucleus CMS, an open source content management system. The version of Nucleus CMS installed on the remote host fails to sanitize input to the
last seen2020-06-01
modified2020-06-02
plugin id21596
published2006-05-25
reporterThis script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/21596
titleNucleus CMS PLUGINADMIN.php DIR_LIBS Parameter Remote File Inclusion