|
Family: CGI abuses --> Category: destructive_attack
FlatNuke < 2.5.6 Multiple Vulnerabilities Vulnerability Scan
Vulnerability Scan Summary Checks for multiple vulnerabilities in FlatNuke < 2.5.6
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP application that is affected by
multiple vulnerabilities.
Description :
The remote host is running FlatNuke, a content management system
written in PHP and using flat files rather than a database for its
storage.
The version of FlatNuke installed on the remote host suffers from
several flaws:
- Arbitrary PHP Code Execution Vulnerability
The application fails to remove newlines from a user's
registration information and stores it as a PHP file with
a known path. A possible hacker can leverage this flaw to
execute arbitrary PHP code on the remote host subject to
the rights of the web server userid.
- Multiple Cross-Site Scripting Vulnerabilities
Various scripts do not sanitize user-supplied input
through several parameters before using it in dynamically
generated pages, which can be exploited by attackers to
launch cross-site scripting attacks against the affected
application.
See also :
http://retrogod.altervista.org/flatnuke.html
Solution :
Upgrade to FlatNuke 2.5.6 or later.
Threat Level:
High / CVSS Base Score : 7
(AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|