|
Family: CGI abuses --> Category: attack
UBB.threads thispath Parameter Remote File Include Vulnerability Vulnerability Scan
Vulnerability Scan Summary Tries to read a local file using UBB.threads
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP application that is susceptible
to remote file inclusion attacks.
Description :
The version of UBB.threads installed on the remote host fails to
sanitize input to the 'thispath' parameter before using it in a PHP
include() function in the 'addpost_newpoll.php' script. Provided
PHP's 'register_globals' setting is enabled, an unauthenticated
attacker may be able to exploit this flaw to view arbitrary files on
the remote host or to execute arbitrary PHP code, possibly taken from
third-party hosts.
See also :
http://www.ubbcentral.com/boards/showflat.php/Cat/0/Number/4560078/an/0/page/0
Solution :
Upgrade to UBB.threads 6.5.3 or later.
Threat Level:
Medium / CVSS Base Score : 6
(AV:R/AC:H/Au:NR/C:P/A:P/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|