Vulnerabilities > CVE-2007-2545 - Remote File Include vulnerability in Persism Content Management System

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
persism-cms
exploit available

Summary

Multiple PHP remote file inclusion vulnerabilities in Persism CMS 0.9.2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the system[path] parameter to (1) blocks/headerfile.php, (2) files/blocks/latest_files.php, (3) filters/headerfile.php, (4) forums/blocks/latest_posts.php, (5) groups/headerfile.php, (6) links/blocks/links.php, (7) menu/headerfile.php, (8) news/blocks/latest_news.php, (9) settings/headerfile.php, or (10) users/headerfile.php, in modules/.

Vulnerable Configurations

Part Description Count
Application
Persism_Cms
1

Exploit-Db

descriptionPersism CMS <= 0.9.2 system[path] Remote File Inclusion Vulnerabilities. CVE-2007-2545. Webapps exploit for php platform
fileexploits/php/webapps/3853.txt
idEDB-ID:3853
last seen2016-01-31
modified2007-05-04
platformphp
port
published2007-05-04
reporterGoLd_M
sourcehttps://www.exploit-db.com/download/3853/
titlePersism CMS <= 0.9.2 - systempath Remote File Inclusion Vulnerabilities
typewebapps