Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: CGI abuses --> Category: attack

SimpleBoard / Joomlaboard sbp Parameter Remote File Include Vulnerabilities Vulnerability Scan


Vulnerability Scan Summary
Tries to read a local file using SimpleBoard / Joomlaboard

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a PHP application that is prone to
remote file include attacks.

Description :

The remote host is running SimpleBoard or Joomlaboard, a web-based
bulletin board component for Mambo / Joomla.

The version of Simpleboard / Joomlaboard installed on the remote host
fails to sanitize user-supplied input to the 'sbp' parameter of the
'file_upload.php' and 'image_upload.php' scripts before using it to
include PHP code. Provided PHP's 'register_globals' setting is
enabled, an unauthenticated attacker may be able to exploit these
flaws to view arbitrary files on the remote host or to execute
arbitrary PHP code, possibly taken from third-party hosts.

See also :

http://milw0rm.com/exploits/1994

Solution :

Disable PHP's 'register_globals' setting or upgrade to Joomlaboard
version 1.1.2 or later.

Threat Level:

Medium / CVSS Base Score : 6
(AV:R/AC:H/Au:NR/C:P/A:P/I:P/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.