Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: CGI abuses --> Category: attack

Aardvark Topsites CONFIG[path] Parameter Remote File Inclusion Vulnerability Vulnerability Scan

Vulnerability Scan Summary
Checks for a file include using CONFIG[path] in Aardvark Topsites

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote system contains a PHP application that is prone to remote
file inclusions attacks.

Description :

Aardvark Topsites PHP is installed on the remote host. It is an
open-source toplist management system written in PHP.

The application does not sanitize user-supplied input to the
'CONFIG[path]' variable in some PHP files, for example, 'lostpw.php'
This allows a possible hacker to include arbitrary files, possibly taken
from remote systems, and to execute them with rights under which
the webserver operates.

The flaw is exploitable if PHP's 'register_globals' setting is

See also :

Solution :

Either disable PHP's 'register_globals' or upgrade to Aardvark
Topsites PHP version 5.0.2 or later.

Threat Level:

Medium / CVSS Base Score : 4.7

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.