|
Family: CGI abuses --> Category: attack
Aardvark Topsites CONFIG[path] Parameter Remote File Inclusion Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for a file include using CONFIG[path] in Aardvark Topsites
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote system contains a PHP application that is prone to remote
file inclusions attacks.
Description :
Aardvark Topsites PHP is installed on the remote host. It is an
open-source toplist management system written in PHP.
The application does not sanitize user-supplied input to the
'CONFIG[path]' variable in some PHP files, for example, 'lostpw.php'
This allows a possible hacker to include arbitrary files, possibly taken
from remote systems, and to execute them with rights under which
the webserver operates.
The flaw is exploitable if PHP's 'register_globals' setting is
enabled.
See also :
http://secunia.com/advisories/19911/
http://www.aardvarktopsitesphp.com/forums/viewtopic.php?t=4301
Solution :
Either disable PHP's 'register_globals' or upgrade to Aardvark
Topsites PHP version 5.0.2 or later.
Threat Level:
Medium / CVSS Base Score : 4.7
(AV:R/AC:L/Au:NR/C:P/I:P/A:N/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|