Release date:
Updated on: 2012-04-27
Affected Systems:
Discuz! Discuz! X2.5Release20120407
Description:
--------------------------------------------------------------------------------
The Discuz forum software system is also called the BBS system.
Discuz! Preg_replace in X2.5 Release 20120407 uses the e modifier and double quotation marks. The remote command execution vulnerability exists. Remote attackers can exploit this vulnerability to execute arbitrary code remotely. To successfully exploit this vulnerability, You need to enable the seo function.
<* Source: kobin97
Link: http://www.wooyun.org/bugs/wooyun-2012-06420
Http://www.zhu.cm/discuz-x2-5-getwebshell-exp-xday.html
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Discuz!
-------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.discuz.net/