First published: Wed Aug 24 2005(Updated: )
includes/common.php in RunCMS 1.2 and earlier calls the extract function with EXTR_OVERWRITE on HTTP POST variables, which allows remote attackers to overwrite arbitrary variables, possibly allowing execution of arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Runcms Runcms | =1.1a | |
Runcms Runcms | =1.2 | |
Runcms Runcms | =1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2691 is considered a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2005-2691, update your RunCMS to version 1.3 or later where the vulnerability is patched.
CVE-2005-2691 affects RunCMS versions 1.1, 1.1a, and 1.2.
The impact of CVE-2005-2691 is that it allows attackers to overwrite arbitrary variables, potentially leading to arbitrary code execution.
CVE-2005-2691 can be exploited by remote attackers who can send crafted HTTP POST requests to the affected server.