|
Family: CGI abuses --> Category: attack
RCBlog post Parameter Directory Traversal Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for directory transversal in RCBlog index.php script
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP script that is prone to directory
traversal attacks.
Description :
The remote host is running RCBlog, a blog written in PHP.
The remote version of this software fails to sanitize user-supplied
input to the 'post' parameter of the 'index.php' script. A possible hacker
can use this to access arbitrary files on the remote host provided
PHP's 'magic_quotes' setting is disabled or, regardless of that
setting, files with a '.txt' extension such as those used by the
application to store administrative credentials.
See also :
http://www.securityfocus.com/archive/1/422499
Solution :
Remove the application as its author no longer supports it.
Threat Level:
Low / CVSS Base Score : 2.3
(AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|