|
Family: CGI abuses --> Category: infos
Cuyahoga FCKEditor Security Bypass Vulnerability Vulnerability Scan
Vulnerability Scan Summary Tries to call FCKEditor's upload.php script
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a .NET application that is affected by a
security bypass vulnerability.
Description :
The remote host is running Cuyahoga, an open-source .NET web site
framework.
The installation of Cuyahoga fails to require authorization to access
the FCKEditor component included with it. An unauthenticated remote
attacker may be able to leverage this flaw to view and upload files
with FCKEditor.
See also :
http://www.cuyahoga-project.org/10/section.aspx/61
Solution :
Either retrieve the updated 'Web.config' file and place it in the
'Support/FCKeditor/editor/filemanager' directory of the affected site
or upgrade to Cuyahoga 1.0.1 or later.
Threat Level:
Low / CVSS Base Score : 2.3
(AV:R/AC:L/Au:NR/C:N/I:P/A:N/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|