ImpressPages CMS未明远程代码执行漏洞

漏洞信息详情

ImpressPages CMS未明远程代码执行漏洞

漏洞简介

ImpressPages CMS 1.0.12版本和其他的1.0.13之前版本中的ip_cms/modules/standard/content_management/actions.php中存在Eval注入漏洞。远程攻击者可利用该漏洞通过cm_group参数,执行任意代码。

漏洞公告

目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:

http://www.impresspages.org/news/impresspages-1-0-13-security-release/

参考网址

来源: BID

名称: 49798

链接:http://www.securityfocus.com/bid/49798

来源: OSVDB

名称: 75783

链接:http://www.osvdb.org/75783

来源: MLIST

名称: [oss-security] 20120118 Re: CVE-request: NGS00109 remote code execution in ImpressPages CMS

链接:http://www.openwall.com/lists/oss-security/2012/01/18/12

来源: MLIST

名称: [oss-security] 20120115 CVE-request: NGS00109 remote code execution in ImpressPages CMS

链接:http://www.openwall.com/lists/oss-security/2012/01/15/9

来源: www.impresspages.org

链接:http://www.impresspages.org/news/impresspages-1-0-13-security-release/

来源: SECUNIA

名称: 46193

链接:http://secunia.com/advisories/46193

来源: BUGTRAQ

名称: 20110927 NGS00109 Patch Notification: ImpressPages CMS Remote code execution

链接:http://seclists.org/bugtraq/2011/Sep/156

来源: BUGTRAQ

名称: 20120105 NGS00109 Technical Advisory: Remote Code Execution in ImpressPages CMS

链接:http://archives.neohapsis.com/archives/bugtraq/2012-01/0029.html

来源:NSFOCUS
名称:20957
链接:http://www.nsfocus.net/vulndb/20957

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享