Description
Multiple directory traversal vulnerabilities in Nuked-KlaN 1.4b and 1.5b allow remote attackers to read or include arbitrary files via .. sequences in (1) the user_langue parameter to index.php or (2) the langue parameter to update.php, or modify arbitrary GLOBAL variables by causing globals.php to be loaded before conf.inc.php via (3) .. sequences in the file parameter with the page parameter set to globals, or (4) ../globals.php in the user_langue parameter, as demonstrated by modifying $nuked[prefix] in the Suggest module.
Product(s):
- Nuked-Klan 1.2
- Nuked-Klan 1.2 Beta
- Nuked-Klan Nuked-Klan 1.3
- Nuked-Klan Nuked-Klan 1.3 Beta
- Nuked-Klan Nuked-Klan 1.4
- Nuked-Klan Nuked-Klan 1.5
- Nuked-Klan Nuked-Klan 1.5 SP2
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-1937, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-1937 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.