First published: Tue Apr 19 2005(Updated: )
** DISPUTED ** NOTE: this issue has been disputed by the vendor. PHP remote code injection vulnerability in loader.php for Ariadne CMS 2.4 allows remote attackers to execute arbitrary PHP code by modifying the ariadne parameter to reference a URL on a remote web server that contains the code. NOTE: the vendor has disputed this issue, saying that loader.php first requires the "ariadne.inc" file, which defines the $ariadne variable, and thus it cannot be modified by an attacker. In addition, CVE personnel have partially verified the dispute via source code inspection of Ariadne 2.4 as available on July 5, 2005.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ariadne CMS | =2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2005-1181 is classified as medium due to the potential for remote code execution.
To fix CVE-2005-1181, upgrade to a version of Ariadne CMS that is not vulnerable to this issue.
CVE-2005-1181 affects Ariadne CMS version 2.4.
Yes, CVE-2005-1181 can be exploited remotely due to its design in loader.php.
Yes, the issue outlined in CVE-2005-1181 has been disputed by the vendor.