Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Gentoo Local Security Checks --> Category: infos

[GLSA-200412-27] PHProjekt: Remote code execution vulnerability Vulnerability Scan


Vulnerability Scan Summary
PHProjekt: Remote code execution vulnerability

Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200412-27
(PHProjekt: Remote code execution vulnerability)


cYon discovered that the authform.inc.php script allows a remote
user to define the global variable $path_pre.

Impact

A remote attacker can exploit this vulnerability to force
authform.inc.php to download and execute arbitrary PHP code with the
rights of the web server user.

Workaround

There is no known workaround at this time.

References:
http://www.phprojekt.com/modules.php?op=modload&name=News&file=article&sid=193&mode=thread&order=0


Solution:
All PHProjekt users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/phprojekt-4.2-r2"


Threat Level: High


Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.