Family: CGI abuses --> Category: mixed
SimpleBBS name Parameter Arbitrary Command Execution Vulnerability Vulnerability Scan
Vulnerability Scan Summary
Checks for name parameter arbitrary command execution vulnerability in SimpleBBS
Detailed Explanation for this Vulnerability Test
The remote web server contains a PHP application that is prone to an
arbitrary command execution vulnerability.
The remote host appears to be running SimpleBBS, an open-source
bulletin board system written in PHP.
The version of SimpleBBS installed on the remote host fails to
sanitize user-supplied input to the 'name' parameter of the
'index.php' script when creating a new topic and adds that input to
several PHP files. A possible hacker can leverage this flaw to inject
arbitrary PHP code into the application and then call one of those
files directly to cause that code to be executed on the remote host
subject to the rights of the web server user id.
See also :
Limit the ability to create new topics to trusted users.
High / CVSS Base Score : 7.0
Click HERE for more information and discussions on this network vulnerability scan.