Summary
CMS Made Simple is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input.
An attacker can exploit this vulnerability to obtain potentially sensitive information and execute arbitrary local scripts in the context of the webserver process. This may allow the attacker to compromise the application and the underlying computer other attacks
are also possible.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2010-2797 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- AWStats Totals 'sort' Parameter Remote Command Execution Vulnerabilities
- AjaxPortal 'di.php' File Inclusion Vulnerability
- Alchemy Eye HTTP Command Execution
- AlienVault Open Source SIEM (OSSIM) 'timestamp' Parameter Directory Traversal Vulnerability
- Apple Safari RSS Feed Information Disclosure Vulnerability