Get a Pentest and security assessment of your IT network.

Advisories

Pulse CMS login.php Arbitrary File Writing

Secunia Research has discovered a vulnerability in Pulse CMS, which can be exploited by people to compromise a vulnerable system. An error within includes/login.php in the handling of failed login attempts can be exploited to store content in an arbitrary file within the web root. This e.g. allows executing arbitrary PHP code via a specially crafted request. Successful exploitation requires that “register_globals” is enabled.

 

You can download this advisory from the following link: https://packetstormsecurity.com/files/download/87597/secunia-pulselogin.txt

Source: https://packetstormsecurity.com/files/87597/Pulse-CMS-login.php-Arbitrary-File-Writing.html

Related posts
Advisories

Secunia Security Advisory 15017

Advisories

Secunia Security Advisory 18394

Advisories

Secunia Security Advisory 21136

Advisories

Secunia Security Advisory 24114