|
Family: CGI abuses --> Category: attack
Siteframe LOCAL_PATH Remote File Include Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for LOCAL_PATH remote file include vulnerability in Siteframe
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP script that is prone to a remote
file include attack.
Description :
The remote host is running Siteframe, an open-source content
management system using PHP and MySQL.
The installed version of Siteframe does not properly sanitize the
'LOCAL_PATH' parameter of the 'siteframe.php' script before using it
to include files. By leveraging this flaw, a possible hacker is able to
view arbitrary files on the remote host and even execute arbitrary PHP
code, possibly taken from third-party hosts.
See also :
http://securitytracker.com/alerts/2005/Jun/1014150.html
http://v3.siteframe.org/document.php?id=483
Solution :
Patch 'siteframe.php' as suggested in the project document referenced
above.
Threat Level:
High / CVSS Base Score : 7
(AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|