PostNuke *error.php* Local File Inclusion

Posted on Tuesday, November 21, 2006 @ 07:48:08 CST in Postnuke
by Raven

SECUNIA ADVISORY ID: SA22983

VERIFY ADVISORY: http://secunia.com/advisories/22983/

CRITICAL: Moderately critical

IMPACT: Exposure of sensitive information

SOFTWARE: PostNuke 0.x - http://secunia.com/product/350/

DESCRIPTION: A vulnerability has been reported in PostNuke, which can be exploited by malicious people to disclose sensitive information. Input passed to the "PNSVlang" variable is not properly sanitised before it is used to include files in error.php. This can be exploited to include arbitrary files via directory traversal attacks. The vulnerability is reported in versions prior to 0.764.

SOLUTION: Update to version 0.764.

PROVIDED AND/OR DISCOVERED BY: The vendor credits Kacper.

ORIGINAL ADVISORY: http://community.postnuke.com/index.php?name=News&file=article&sid=2787
 
 
click Related        click Share
 
 
Associated Topics

Bugs


Bugs and Alerts


Security
 
News ©

Site Info

Last SeenLast Seen
  • vashd1
  • neralex
Server TrafficServer Traffic
  • Total: 513,101,632
  • Today: 167,827
Server InfoServer Info
  • Apr 23, 2025
  • 03:20 pm CDT