|
Family: CGI abuses --> Category: attack
Ashnews Code Injection Vulnerability Scan
Vulnerability Scan Summary Searches for the existence of ashnews.php
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP application that is affected by
multiple vulnerabilities.
Description :
It is possible to make the remote host include php files hosted on a
third party server using Ashnews.
A possible hacker may use this flaw to inject arbitrary code in the remote
host and gain a shell with the rights of the web server.
In addition, the application reportedly fails to sanitize the 'id'
parameter before using it in dynamically-generated output, subjecting
users to cross-site scripting attacks.
See also :
http://www.securityfocus.com/archive/1/329910
http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041844.html
Solution :
Remove the software as it is no longer supported.
Threat Level:
Low / CVSS Base Score : 2.3
(AV:R/AC:L/Au:NR/C:N/I:P/A:N/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|