Amol Naik has discovered a vulnerability in Nuggetz CMS, which can be exploited by malicious people to compromise a vulnerable system.
Input passed via the "pagevalue" and "nugget" parameters to admin/ajaxsave.php is not properly sanitised before being used to save files. This can be exploited to e.g. create arbitrary PHP files via a specially crafted HTTP POST request.
Successful exploitation requires that "magic_quotes_gpc" is disabled.
The vulnerability is confirmed in version 1.0.
Solution: Update to version 1.0.1 or later.
Provided and/or discovered by: Amol Naik
Original Advisory: Amol Naik:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org