|
Family: CGI abuses --> Category: attack
dotProject Remote File Include Vulnerabilities Vulnerability Scan
Vulnerability Scan Summary Checks for remote file include vulnerabilities in dotProject
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP application that is affected by
multiple remote file include vulnerabilities.
Description :
The remote host is running dotProject, a web-based, open-source,
project management application written in PHP.
The installed version of dotProject fails to sanitize input to various
parameters and scripts before using it to include PHP code. Provided
PHP's 'register_globals' setting is enabled, an unauthenticated
attacker may be able to exploit these flaws to view arbitrary files on
the remote host or to execute arbitrary PHP code, possibly taken from
third-party hosts.
See also :
http://www.securityfocus.com/archive/1/424957/30/0/threaded
http://milw0rm.com/exploits/2191
http://www.dotproject.net/vbulletin/showthread.php?t=4462
http://www.securityfocus.com/archive/1/425285/100/0/threaded
Solution :
Disable PHP's 'register_globals' setting as per the application's
installation instructions.
Threat Level:
High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|