|
Family: CGI abuses --> Category: attack
Docebo GLOBALS Variable Overwrite Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for file inclusions errors in multiple Docebo applications
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote host contains a PHP application that is vulnerable to
remote and local file inclusions.
Description :
At least one Docebo application is installed on the remote host.
Docebo has multiple PHP based applications, including a content
management system (DoceboCMS), a e-learning platform (DoceboLMS) and a
knowledge maintenance system (DoceboKMS)
By using a flaw in some PHP versions (PHP4 <= 4.4.0 and PHP5 <= 5.0.5)
it is possible to include files by overwriting the $GLOBALS variable.
This flaw exists if PHP's register_globals is enabled.
See also :
http://secunia.com/advisories/20260/
http://www.hardened-php.net/advisory_202005.79.html
http://www.nessus.org/u?ecd946e9
Solution :
Disable PHP's register_globals and/or upgrade to a newer PHP release.
The author has also released a patch to address the issues.
Threat Level:
Medium / CVSS Base Score : 6
(AV:R/AC:H/Au:NR/C:P/A:P/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|