First published: Mon Aug 17 2009(Updated: )
Multiple directory traversal vulnerabilities in dit.cms 1.3, when register_globals is enabled, allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the path parameter to index.php in (1) install/, (2) menus/left_rightslideopen/, (3) menus/side_pullout/, (4) menus/side_slideopen/, (5) menus/simple/, (6) menus/top_dropdown/, and (7) menus/topside/; the sitemap parameter to index.php in (8) menus/left_rightslideopen/, (9) menus/side_pullout/, (10) menus/side_slideopen/, (11) menus/top_dropdown/, and (12) menus/topside/; and the (13) relPath parameter to index/index.php. NOTE: PHP remote file inclusion vulnerabilities reportedly also exist for some of these vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ditcms | =1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2784 has a high severity rating due to its ability to allow remote attackers to execute arbitrary local files.
To mitigate CVE-2009-2784, disable register_globals in the PHP configuration and update to a patched version of dit.cms.
CVE-2009-2784 can lead to unauthorized file access and execution, compromising system security and data integrity.
Yes, CVE-2009-2784 remains a concern for users of dit.cms 1.3, especially if best practices in configuration are not followed.
CVE-2009-2784 affects dit.cms version 1.3 when register_globals is enabled.