|
Family: CGI abuses --> Category: attack
SimpleBoard / Joomlaboard sbp Parameter Remote File Include Vulnerabilities Vulnerability Scan
Vulnerability Scan Summary Tries to read a local file using SimpleBoard / Joomlaboard
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP application that is prone to
remote file include attacks.
Description :
The remote host is running SimpleBoard or Joomlaboard, a web-based
bulletin board component for Mambo / Joomla.
The version of Simpleboard / Joomlaboard installed on the remote host
fails to sanitize user-supplied input to the 'sbp' parameter of the
'file_upload.php' and 'image_upload.php' scripts before using it to
include PHP code. Provided PHP's 'register_globals' setting is
enabled, an unauthenticated attacker may be able to exploit these
flaws to view arbitrary files on the remote host or to execute
arbitrary PHP code, possibly taken from third-party hosts.
See also :
http://milw0rm.com/exploits/1994
Solution :
Disable PHP's 'register_globals' setting or upgrade to Joomlaboard
version 1.1.2 or later.
Threat Level:
Medium / CVSS Base Score : 6
(AV:R/AC:H/Au:NR/C:P/A:P/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|