Advisories Blog | G5 Cyber Security

Pulse CMS login.php Arbitrary File Writing

Secunia Research has discovered a vulnerability in Pulse CMS, which can be exploited by people to compromise a vulnerable system. An error within includes/login.php in the handling of failed login attempts can be exploited to store content in an arbitrary file within the web root. This e.g. allows executing arbitrary PHP code via a specially crafted request. Successful exploitation requires that “register_globals” is enabled.

 

You can download this advisory from the following link: https://packetstormsecurity.com/files/download/87597/secunia-pulselogin.txt

Source: https://packetstormsecurity.com/files/87597/Pulse-CMS-login.php-Arbitrary-File-Writing.html

Exit mobile version