Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: CGI abuses --> Category: attack

XOOPS xoopsConfig Parameter Local File Inclusion Vulnerabilities Vulnerability Scan

Vulnerability Scan Summary
Checks for xoopsConfig parameter local file inclusion vulnerabilities in XOOPS

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a PHP application that is affected by
multiple local file inclusion issues.

Description :

The remote installation of XOOPS fails to sanitize user-supplied input
to the 'xoopsConfig[language]' parameter of several xoopseditor
scripts before using it in PHP 'include' functions. An
unauthenticated attacker may be able to leverage these issues to read
arbitrary local files and even execute arbitrary PHP code, subject to
the rights of the web server user id. Successful exploitation
requires that PHP's 'register_globals' setting be enabled and possibly
that 'magic_quotes_gpc' be disabled.

See also :

Solution :

Disable PHP's 'register_globals' setting and enable its
'magic_quotes_gpc' setting.

Threat Level:

Medium / CVSS Base Score : 4.7

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.