Redgraphic SAPID CMS Multiple Remote File Include Vulnerabilities
8 Oct. 2012
Summary
This allow remote attackers to execute arbitrary PHP code via a URL in the (1) GLOBALS[root_path] parameter to usr/extensions/get_tree.inc.php or (2) root_path parameter to usr/extensions/get_infochannel.inc.php.
Vulnerable Systems:
* Redgraphic Sapid Cms 1.2.3 and prior
SAPID CMS could allow a remote attacker to include arbitrary files. A remote attacker could send a specially-crafted URL request to the et_tree.inc.php and get_infochannel.inc.php scripts using the root_path parameter to specify a malicious file from a remote system, which could allow the attacker to execute arbitrary code on the vulnerable Web server.
Vendor Status:
Currently we are not aware of any vendor-supplied patches.