Family: CGI abuses --> Category: attack
Aardvark Topsites CONFIG[path] Parameter Remote File Inclusion Vulnerability Vulnerability Scan
Vulnerability Scan Summary
Checks for a file include using CONFIG[path] in Aardvark Topsites
Detailed Explanation for this Vulnerability Test
The remote system contains a PHP application that is prone to remote
file inclusions attacks.
Aardvark Topsites PHP is installed on the remote host. It is an
open-source toplist management system written in PHP.
The application does not sanitize user-supplied input to the
'CONFIG[path]' variable in some PHP files, for example, 'lostpw.php'
This allows a possible hacker to include arbitrary files, possibly taken
from remote systems, and to execute them with rights under which
the webserver operates.
The flaw is exploitable if PHP's 'register_globals' setting is
See also :
Either disable PHP's 'register_globals' or upgrade to Aardvark
Topsites PHP version 5.0.2 or later.
Medium / CVSS Base Score : 4.7
Click HERE for more information and discussions on this network vulnerability scan.