|
Family: CGI abuses --> Category: attack
Simple PHP Blog <= 0.4.0 Multiple Vulnerabilities Vulnerability Scan
Vulnerability Scan Summary Checks for multiple vulnerabilities in Simple PHP Blog <= 0.4.0
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP application that is affected by
multiple issues.
Description :
The remote host is running Simple PHP Blog, a blog written in PHP.
The version of Simple PHP Blog installed on the remote host allows
authenticated attackers to upload files containing arbitrary code to
be executed within the context of the web server userid. In addition,
it likely lets anyone retrieve its configuration file as well as the
user list and to delete arbitrary files subject to the rights of
the web server user id.
See also :
http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0885.html
http://www.ftusecurity.com/pub/sphpblog_vulns
Solution :
Upgrade to Simple PHP Blog 0.4.5 or later.
Threat Level:
High / CVSS Base Score : 7
(AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|