Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: CGI abuses --> Category: mixed

SimpleBBS name Parameter Arbitrary Command Execution Vulnerability Vulnerability Scan


Vulnerability Scan Summary
Checks for name parameter arbitrary command execution vulnerability in SimpleBBS

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a PHP application that is prone to an
arbitrary command execution vulnerability.

Description :

The remote host appears to be running SimpleBBS, an open-source
bulletin board system written in PHP.

The version of SimpleBBS installed on the remote host fails to
sanitize user-supplied input to the 'name' parameter of the
'index.php' script when creating a new topic and adds that input to
several PHP files. A possible hacker can leverage this flaw to inject
arbitrary PHP code into the application and then call one of those
files directly to cause that code to be executed on the remote host
subject to the rights of the web server user id.

See also :

http://www.securityfocus.com/archive/1/418838

Solution :

Limit the ability to create new topics to trusted users.

Threat Level:

High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:I)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.