Title: 1024 CMS /themes/default/layouts/basic_footer.php theme_dir Parameter Traversal Local File Inclusion
Jul 04, 2008
1024 CMS contains a flaw that may allow a remote attacker to execute arbitrary commands or code. The issue is due to the '/themes/default/layouts/basic_footer.php' script not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../) supplied to the 'theme_dir' parameter. This may allow an attacker to include a file from the targeted host that contains arbitrary commands or code that will be executed by the vulnerable script. Such attacks are limited due to the script only calling files already on the target host. In addition, this flaw can potentially be used to disclose the contents of any file on the system accessible by the web server.
Remote / Network Access
Loss of Integrity
OSVDB is not aware of a solution for this vulnerability.