First published: Mon Oct 01 2012(Updated: )
miniCMS 1.0 and 2.0 allows remote attackers to execute arbitrary PHP code via a crafted (1) pagename or (2) area variable containing an executable extension, which is not properly handled by (a) update.php when writing files to content/, or (b) updatenews.php when writing files to content/news/.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jessgramp Minicms | =1.0 | |
Jessgramp Minicms | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5231 has a high severity rating due to its potential for arbitrary PHP code execution.
To fix CVE-2012-5231, update miniCMS to the latest version or implement input validation to prevent executable extensions in pagename and area variables.
CVE-2012-5231 affects miniCMS versions 1.0 and 2.0.
Yes, CVE-2012-5231 can be exploited remotely by attackers through crafted inputs.
Exploiting CVE-2012-5231 can lead to remote code execution, allowing attackers to run arbitrary PHP code on the server.