|
Family: CGI abuses --> Category: attack
YaPiG Remote Server-Side Script Execution Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for YaPiG version
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP application that is prone to
arbitrary PHP code injection vulnerabilities.
Description :
The remote host is running YaPiG, a web-based image gallery written in
PHP.
The remote version of YaPiG may allow a remote attacker to execute
malicious scripts on a vulnerable system. This issue exists due to a
lack of sanitization of user-supplied data. It is reported that an
attacker may be able to upload content that will be saved on the
server with a '.php' extension. When this file is requested by the
attacker, the contents of the file will be parsed and executed by the
PHP engine, rather than being sent. Successful exploitation of this
issue may allow a possible hacker to execute malicious script code on a
vulnerable server.
See also :
http://archives.neohapsis.com/archives/fulldisclosure/2004-08/0756.html
Solution :
Upgrade to YaPiG 0.92.2 or later.
Threat Level:
High / CVSS Base Score : 7
(AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|