|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200412-27] PHProjekt: Remote code execution vulnerability Vulnerability Scan
Vulnerability Scan Summary PHProjekt: Remote code execution vulnerability
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200412-27
(PHProjekt: Remote code execution vulnerability)
cYon discovered that the authform.inc.php script allows a remote
user to define the global variable $path_pre.
Impact
A remote attacker can exploit this vulnerability to force
authform.inc.php to download and execute arbitrary PHP code with the
rights of the web server user.
Workaround
There is no known workaround at this time.
References:
http://www.phprojekt.com/modules.php?op=modload&name=News&file=article&sid=193&mode=thread&order=0
Solution:
All PHProjekt users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/phprojekt-4.2-r2"
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|