|
Family: CGI abuses --> Category: attack
Loudblog backend_settings.php Remote File Include Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for remote file include vulnerability in Loudblog's backend_settings.php
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP script that is prone to a remote
file include vulnerability.
Description :
The remote host is running Loudblog, a PHP application for publishing
podcasts and similar media files.
The installed version of Loudblog fails to validate user input to the
'GLOBALS[path]' and 'language' parameters before using them in the
'loudblog/inc/backend_settings.php' script in a PHP 'include'
function. Provide PHP's 'register_globals' setting is enabled, an
unauthenticated attacker can exploit this flaw to run arbitrary code,
possibly taken from third-party hosts, subject to the rights of
the web server user id.
See also :
http://www.securityfocus.com/archive/1/423947/30/0/threaded
http://loudblog.de/forum/viewtopic.php?id=576
Solution :
Upgrade to Loudblog 0.41 or later.
Threat Level:
High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|