|
Family: CGI abuses --> Category: infos
php-ping Count Parameter Command Execution Vulnerability Vulnerability Scan
Vulnerability Scan Summary Detect PHP Ping Code Execution
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP script that allows for arbitrary
command execution.
Description :
The remote host appears to be running 'php-ping.php' from
TheWorldsEnd.NET. The remote version of this script does not properly
sanitize the 'count' parameter and allows attackers to execute
arbitrary commands or read arbitrary files on the remote host subject
to the rights of the web server user id.
Solution :
Remove or update the affected script.
Threat Level:
High / CVSS Base Score : 7
(AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|