Get a Pentest and security assessment of your IT network.

Advisories

Pulse CMS Arbitrary File Writing

Secunia Research has discovered a vulnerability in Pulse CMS, which can be exploited by malicious users to compromise a vulnerable system. Input passed via the “filename” and “block” parameters to view.php is not properly sanitized before being used to write to a file. This can be exploited to write arbitrary content to an arbitrary file via a specially crafted POST request and allows executing arbitrary PHP code. Successful exploitation requires authentication.

 

You can download this advisory from the following link: https://packetstormsecurity.com/files/download/87595/secunia-pulsewriting.txt

Source: https://packetstormsecurity.com/files/87595/Pulse-CMS-Arbitrary-File-Writing.html

Related posts
Advisories

57657.html

Advisories

Secunia Security Advisory 17317

Advisories

Ubuntu Security Notice 284-1

Advisories

Hardened-PHP Project Security Advisory 2006-14.139