First published: Mon Aug 17 2009(Updated: )
Directory traversal vulnerability in plugings/pagecontent.php in Really Simple CMS (RSCMS) 0.3a allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the PT parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Really Simple CMS | =0.3a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2792 has a medium severity rating due to its potential for remote file inclusion and execution of arbitrary code.
To fix CVE-2009-2792, upgrade to a more secure version of Really Simple CMS that has patched this directory traversal vulnerability.
CVE-2009-2792 affects Really Simple CMS (RSCMS) version 0.3a.
Yes, CVE-2009-2792 can be exploited remotely by attackers through specially crafted requests.
The impact of CVE-2009-2792 on web applications includes the potential for unauthorized access and execution of sensitive files.