CVE-2013-1807 – PHP-Fusion 7.02.05 - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2013-1807
PHP-Fusion before 7.02.06 stores backup files with predictable filenames in an unrestricted directory under the web document root, which might allow remote attackers to obtain sensitive information via a direct request to the backup file in administration/db_backups/. PHP-Fusion anterior a 7.02.06 almacena archivos de copia de seguridad con nombres de archivo previsibles en un directorio no restringido bajo el root de documento web, lo que podría permitir a atacantes remotos obtener información sensible a través de una solicitud directa al archivo de copia de seguridad en administration/db_backups/. • https://www.exploit-db.com/exploits/24562 http://packetstormsecurity.com/files/120598/PHP-Fusion-7.02.05-XSS-LFI-SQL-Injection.html http://seclists.org/fulldisclosure/2013/Feb/154 http://www.openwall.com/lists/oss-security/2013/03/03/1 http://www.openwall.com/lists/oss-security/2013/03/03/2 http://www.osvdb.org/90691 http://www.php-fusion.co.uk/news.php?readmore=569 http://www.waraxe.us/advisory-97.html • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2013-1806 – PHP-Fusion 7.02.05 - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2013-1806
Multiple directory traversal vulnerabilities in PHP-Fusion before 7.02.06 allow remote authenticated users to include and execute arbitrary files via a .. (dot dot) in the (1) user_theme parameter to maincore.php; or remote authenticated administrators to delete arbitrary files via the (2) enable parameter to administration/user_fields.php or (3) file parameter to administration/db_backup.php. Múltiples vulnerabilidades de salto de directorio en PHP-Fusion anterior a 7.02.06 permiten a usuarios remotos autenticados incluir y ejecutar archivos arbitrarios a través de un .. (punto punto) en (1) el parámetro user_theme hacia maincore.php; o administradores remotos autenticados eliminar archivos arbitrarios a través de (2) el parámetro enable hacia administration/user_fields.php o (3) el parámetro file hacia administration/db_backup.php. • https://www.exploit-db.com/exploits/24562 http://packetstormsecurity.com/files/120598/PHP-Fusion-7.02.05-XSS-LFI-SQL-Injection.html http://seclists.org/fulldisclosure/2013/Feb/154 http://www.openwall.com/lists/oss-security/2013/03/03/1 http://www.openwall.com/lists/oss-security/2013/03/03/2 http://www.osvdb.org/90692 http://www.osvdb.org/90694 http://www.osvdb.org/90696 http://www.php-fusion.co.uk/news.php?readmore=569 http://www.waraxe.us/advisory • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2013-1804 – PHP-Fusion 7.02.05 - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2013-1804
Multiple cross-site scripting (XSS) vulnerabilities in PHP-Fusion before 7.02.06 allow remote attackers to inject arbitrary web script or HTML via the (1) highlight parameter to forum/viewthread.php; or remote authenticated users with certain permissions to inject arbitrary web script or HTML via the (2) user_list or (3) user_types parameter to messages.php; (4) message parameter to infusions/shoutbox_panel/shoutbox_admin.php; (5) message parameter to administration/news.php; (6) panel_list parameter to administration/panel_editor.php; (7) HTTP User Agent string to administration/phpinfo.php; (8) "__BBCODE__" parameter to administration/bbcodes.php; errorMessage parameter to (9) article_cats.php, (10) download_cats.php, (11) news_cats.php, or (12) weblink_cats.php in administration/, when error is 3; or (13) body or (14) body2 parameter to administration/articles.php. Múltiples vulnerabilidades de XSS en PHP-Fusion anterior a 7.02.06 permiten a atacantes remotos inyectar script Web o HTML arbitrarios a través del (1) parámetro highlight hacia forum/viewthread.php; o usuarios remotos autenticados con ciertos permisos inyectar script Web o HTML arbitrarios a través del (2) parámetro user_list o (3) el parámetro user_types hacia messages.php; (4) el parámetro message hacia infusions/shoutbox_panel/shoutbox_admin.php; (5) el parámetro message hacia administration/news.php; (6) el parámetro panel_list hacia administration/panel_editor.php; (7) la cadena HTTP User Agent hacia administration/phpinfo.php; (8) el parámetro "__BBCODE__" hacia administration/bbcodes.php; el parámetro errorMessage hacia (9) article_cats.php, (10) download_cats.php, (11) news_cats.php o (12) weblink_cats.php en administration/, cuando el error es 3; o (13) el parámetro body o (14) body2 hacia administration/articles.php. • https://www.exploit-db.com/exploits/24562 http://osvdb.org/90707 http://osvdb.org/90708 http://packetstormsecurity.com/files/120598/PHP-Fusion-7.02.05-XSS-LFI-SQL-Injection.html http://seclists.org/fulldisclosure/2013/Feb/154 http://secunia.com/advisories/52403 http://www.openwall.com/lists/oss-security/2013/03/03/1 http://www.openwall.com/lists/oss-security/2013/03/03/2 http://www.php-fusion.co.uk/news.php?readmore=569 http://www.waraxe.us/advisory-97& • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2012-6043 – PHP-Fusion 7.2.4 - 'downloads.php' Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2012-6043
Cross-site scripting (XSS) vulnerability in downloads.php in PHP-Fusion 7.02.04 allows remote attackers to inject arbitrary web script or HTML via the cat_id parameter. Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en downloads.php en PHP-Fusion v7.02.04 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro cat_id. • https://www.exploit-db.com/exploits/36541 http://packetstormsecurity.org/files/view/108542/phpfusion70204-xss.txt http://www.securityfocus.com/bid/51365 https://exchange.xforce.ibmcloud.com/vulnerabilities/72311 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2010-4931 – PHP-Fusion - Local File Inclusion
https://notcve.org/view.php?id=CVE-2010-4931
Directory traversal vulnerability in maincore.php in PHP-Fusion allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the folder_level parameter. NOTE: this issue has been disputed by a reliable third party **EN DISPUTA** Vulnerabilidad de salto de directorio en maincore.php in PHP-Fusion, permite a atacantes remotos incluir y ejecutar ficheros locales de su elección al utilizar caracteres .. (punto punto) en el parámetro folder_level. NOTA: está disputada por un tercero de confianza • https://www.exploit-db.com/exploits/14647 http://attrition.org/pipermail/vim/2010-August/002391.html http://www.exploit-db.com/exploits/14647 http://www.securityfocus.com/bid/42456 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •