|
Family: CGI abuses --> Category: attack
NOCC <= 1.0 Multiple Vulnerabilities Vulnerability Scan
Vulnerability Scan Summary Checks for a local file include flaw in NOCC
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP application that is affected by
multiple vulnerabilities.
Description :
The remote host is running NOCC, an open-source webmail application
written in PHP.
The installed version of NOCC is affected by a local file include flaw
because it fails to sanitize user input to the 'lang' parameter of the
'index.php' script before using it to include other PHP files.
Regardless of PHP's 'register_globals' and 'magic_quotes_gpc'
settings, an unauthenticated attacker can leverage this issue to view
arbitrary files on the remote host and possibly to execute arbitrary
PHP code in files on the affected host.
In addition, NOCC reportedly is affected by several other local and
remote file include, cross-site scripting, and information disclosure
vulnerabilities.
See also :
http://retrogod.altervista.org/noccw_10_incl_xpl.html
http://www.securityfocus.com/archive/1/425889/30/0/threaded
Solution :
Unknown at this time.
Threat Level:
High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|