SB2019092310 - Local PHP file inclusion in Gila CMS



SB2019092310 - Local PHP file inclusion in Gila CMS

Published: September 23, 2019

Security Bulletin ID SB2019092310
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Local PHP file inclusion (CVE-ID: CVE-2019-16679)

The vulnerability allows a remote attacker to include and execute arbitrary PHP files on the server.

The vulnerability exists due to incorrect input validation when including PHP files in the "f" parameter in "admin/fm" URL. A remote authenticated administrator can send a specially crafted HTTP request to the affected application, include and execute arbitrary PHP code on the system with privileges of the web server.

PoC:

http://[host]/admin/fm/?f=src../../../../../../../../../WINDOWS/system32/drivers/etc/hosts


Remediation

Install update from vendor's website.