what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 1 of 1 RSS Feed

Files

Pulse CMS Arbitrary File Deletion
Posted Mar 24, 2010
Site secunia.com

Secunia Research has discovered a vulnerability in Pulse CMS, which can be exploited by malicious users to manipulate certain data. Input passed via the "f" parameter to delete.php is not properly sanitized before deleting files. This can be exploited to delete arbitrary files with the permissions of the web server via directory traversal attacks. Successful exploitation requires authentication.

tags | advisory, web, arbitrary, php
advisories | CVE-2010-0989
SHA-256 | 7450fd8e62d2065d4bee6409cb1e2e3c46e4a4ad0a47d7eae22b538cda229e64
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close