SECUNIA ADVISORY ID: SA22983
VERIFY ADVISORY: http://secunia.com/advisories/22983/
CRITICAL: Moderately critical
IMPACT: Exposure of sensitive information
SOFTWARE: PostNuke 0.x - http://secunia.com/product/350/
DESCRIPTION: A vulnerability has been reported in PostNuke, which can be exploited by malicious people to disclose sensitive information. Input passed to the "PNSVlang" variable is not properly sanitised before it is used to include files in error.php. This can be exploited to include arbitrary files via directory traversal attacks. The vulnerability is reported in versions prior to 0.764.
SOLUTION: Update to version 0.764.
PROVIDED AND/OR DISCOVERED BY: The vendor credits Kacper.
ORIGINAL ADVISORY: http://community.postnuke.com/index.php?name=News&file=article&sid=2787
PostNuke *error.php* Local File Inclusion
Posted on Tuesday, November 21, 2006 @ 08:48:08 CST in Postnuke
|
TextAds: a simple, polite, and inexpensive alternative to banners and other onli
Posted on Monday, August 22, 2005 @ 10:43:06 CDT in Postnuke nukeevangelist writes:
|
PostNuke Security Advisory PNSA 2005-1
Posted on Monday, February 28, 2005 @ 21:41:02 CST in Postnuke
|
KISGB For PostNuke - Coming Soon!
Posted on Sunday, March 16, 2003 @ 08:41:58 CST in Postnuke
|