Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: CGI abuses --> Category: attack

Aardvark Topsites CONFIG[path] Parameter Remote File Inclusion Vulnerability Vulnerability Scan


Vulnerability Scan Summary
Checks for a file include using CONFIG[path] in Aardvark Topsites

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote system contains a PHP application that is prone to remote
file inclusions attacks.

Description :

Aardvark Topsites PHP is installed on the remote host. It is an
open-source toplist management system written in PHP.

The application does not sanitize user-supplied input to the
'CONFIG[path]' variable in some PHP files, for example, 'lostpw.php'
This allows a possible hacker to include arbitrary files, possibly taken
from remote systems, and to execute them with rights under which
the webserver operates.

The flaw is exploitable if PHP's 'register_globals' setting is
enabled.

See also :

http://secunia.com/advisories/19911/
http://www.aardvarktopsitesphp.com/forums/viewtopic.php?t=4301

Solution :

Either disable PHP's 'register_globals' or upgrade to Aardvark
Topsites PHP version 5.0.2 or later.

Threat Level:

Medium / CVSS Base Score : 4.7
(AV:R/AC:L/Au:NR/C:P/I:P/A:N/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.