|
Family: CGI abuses --> Category: attack
XOOPS xoopsConfig Parameter Local File Inclusion Vulnerabilities Vulnerability Scan
Vulnerability Scan Summary Checks for xoopsConfig parameter local file inclusion vulnerabilities in XOOPS
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP application that is affected by
multiple local file inclusion issues.
Description :
The remote installation of XOOPS fails to sanitize user-supplied input
to the 'xoopsConfig[language]' parameter of several xoopseditor
scripts before using it in PHP 'include' functions. An
unauthenticated attacker may be able to leverage these issues to read
arbitrary local files and even execute arbitrary PHP code, subject to
the rights of the web server user id. Successful exploitation
requires that PHP's 'register_globals' setting be enabled and possibly
that 'magic_quotes_gpc' be disabled.
See also :
http://retrogod.altervista.org/xoops_xpl.html
Solution :
Disable PHP's 'register_globals' setting and enable its
'magic_quotes_gpc' setting.
Threat Level:
Medium / CVSS Base Score : 4.7
(AV:R/AC:L/Au:NR/C:P/I:P/A:N/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|