Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: CGI abuses --> Category: attack

ZPanel page Parameter Remote File Include Vulnerabilities Vulnerability Scan

Vulnerability Scan Summary
Tries to read a local file with ZPanel

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a PHP application that is susceptible
to remote file include attacks.

Description :

The remote host is running ZPanel, an open-source hosting control
panel written in PHP.

The installation of ZPanel on the remote host fails to sanitize user-
supplied input to the 'page' and 'body' parameters of the 'zpanel.php'
and 'templates/ZPanelV2/template.php' scripts respectively before
using it to include PHP code. An unauthenticated attacker can exploit
this issue to view arbitrary files or to execute arbitrary PHP code on
the remote host, subject to the rights of the web server user id.

Note that exploitation of this issue via 'zpanel.php' does not require
that PHP's 'register_globals' setting be enabled.

Solution :

Unknown at this time.

Threat Level:

High / CVSS Base Score : 7.0

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.