Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: CGI abuses --> Category: infos

PHP-Nuke copying files security vulnerability (admin.php) Vulnerability Scan


Vulnerability Scan Summary
Determine if a remote host is vulnerable to the admin.php vulnerability

Detailed Explanation for this Vulnerability Test

The remote host seems to be vulnerable to a security problem in
PHP-Nuke (admin.php).
The vulnerability is caused by inadequate processing of queries
by PHP-Nuke's admin.php which enables attackers to copy any file
from the operating system to anywhere else on the operating system.

Impact:
Every file that the webserver has access to can be read by anyone.
Furthermore, any file can be overwritten.
Usernames (used for database access) can be compromised.
Administrative rights can be gained by copying sensitive files.

Solution:
Change the following lines in admin.php:
if($upload)
To:

if (($upload) && ($admintest))

Or upgrade to the latest version (Version 5.3 and above).

Threat Level: High

Additional information:
http://www.securiteam.com/unixfocus/TOBA

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.