|
Family: CGI abuses --> Category: attack
WebCalendar file reading Vulnerability Scan
Vulnerability Scan Summary Checks for file reading flaw in WebCalendar
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server has a PHP script that is affected by a local
file include flaw.
Description :
The remote installation of WebCalendar may allow a possible hacker to read
arbitrary files on the remote host by supplying a filename to the
'user_inc' argument of the file 'long.php'.
See also :
http://www.securityfocus.com/archive/1/329793
http://www.securityfocus.com/archive/1/330521/30/0/threaded
http://sourceforge.net/forum/forum.php?thread_id=901234&forum_id=11588
Solution :
Upgrade to WebCalendar 0.9.42 or later.
Threat Level:
Medium / CVSS Base Score : 4
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:C)
Click HERE for more information and discussions on this network vulnerability scan.
|