Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: CGI abuses --> Category: attack

Contenido cfg Parameter Remote File Include Vulnerability Vulnerability Scan


Vulnerability Scan Summary
Checks for cfg parameter remote file include vulnerability in Contenido

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a PHP application that is prone to a
remote file inclusion vulnerability.

Description :

The remote host appears to be running Contenido, an open-source
content management system written in PHP.

The version of Contenido installed on the remote host fails to
sanitize input to the 'cfg[path][contenido]' and 'cfg[path][classes]'
parameters of the 'contenido/classes/class.inuse.php' script before
using it in a PHP 'require_once' function. Provided PHP's
'register_globals' setting is enabled, an unauthenticated attacker may
be able to exploit this flaw to read arbitrary files on the remote
host and or run arbitrary code, possibly taken from third-party hosts,
subject to the rights of the web server user id.

See also :

http://sourceforge.net/forum/forum.php?forum_id=518356

Solution :

Upgrade to Contenido 4.6.4 or later.

Threat Level:

High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.