Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: CGI abuses --> Category: attack

Atomic Photo Album apa_module_basedir Variable File Include Vulnerability Vulnerability Scan


Vulnerability Scan Summary
Checks for apa_module_basedir variable file include vulnerability in Atomic Photo Album

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a PHP script that is vulnerable to a
remote file inclusion attack.

Description :

The remote host is running Atomic Photo Album, a free, PHP-based photo
gallery.

The installed version of Atomic Photo Album allows remote attackers to
control the 'apa_module_basedir' variable used when including PHP code
in the 'apa_phpinclude.inc.php' script. By leveraging this flaw, an
attacker may be able to view arbitrary files on the remote host and
execute arbitrary PHP code, possibly taken from third-party hosts.

See also :

http://www.securityfocus.com/archive/1/406364/30/0/threaded

Solution :

Ensure that PHP's 'magic_quotes_gpc' setting is enabled and
that 'allow_url_fopen' is disabled.

Threat Level:

High / CVSS Base Score : 7
(AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.