|
Family: CGI abuses --> Category: destructive_attack
PHPFM Arbitrary File Upload Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for arbitrary file upload vulnerability in PHPFM
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP application that is prone to an
arbitrary file upload vulnerability.
Description :
The remote host appears to be running PHPFM, a web-based file manager
written in PHP.
The version of PHPFM installed on the remote host allows anyone to
upload arbitrary files and then to execute them subject to the
rights of the web server user id.
See also :
http://www.securityfocus.com/archive/1/415986/30/0/threaded
Solution :
Set 'AllowUpload' to false in 'conf/config.inc.php' or restrict access
to trusted users.
Threat Level:
Medium / CVSS Base Score : 4.2
(AV:R/AC:L/Au:R/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|