|
Family: CGI abuses --> Category: attack
ZPanel page Parameter Remote File Include Vulnerabilities Vulnerability Scan
Vulnerability Scan Summary Tries to read a local file with ZPanel
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP application that is susceptible
to remote file include attacks.
Description :
The remote host is running ZPanel, an open-source hosting control
panel written in PHP.
The installation of ZPanel on the remote host fails to sanitize user-
supplied input to the 'page' and 'body' parameters of the 'zpanel.php'
and 'templates/ZPanelV2/template.php' scripts respectively before
using it to include PHP code. An unauthenticated attacker can exploit
this issue to view arbitrary files or to execute arbitrary PHP code on
the remote host, subject to the rights of the web server user id.
Note that exploitation of this issue via 'zpanel.php' does not require
that PHP's 'register_globals' setting be enabled.
Solution :
Unknown at this time.
Threat Level:
High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|