|
Family: CGI abuses --> Category: destructive_attack
PunBB language Paramater Local File Include Vulnerability Vulnerability Scan
Vulnerability Scan Summary Tries to read a local file with PunBB
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP script that is affected by a
local file include issue.
Description:
The version of PunBB installed on the remote host fails to sanitize
input to the 'language' parameter before storing it in the
'register.php' script as a user's preferred language setting. By
registering with a specially-crafted value, a possible hacker can leverage
this issue to view arbitrary files and possibly execute arbitrary code
on the affected host.
See also :
http://www.securityfocus.com/archive/1/450055/30/0/threaded
http://forums.punbb.org/viewtopic.php?id=13496
Solution :
Update to version 1.2.14 or later.
Threat Level:
High / CVSS Base Score : 7
(AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|