Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: CGI abuses --> Category: attack

phpBB Module phpbb_root_path Parameter Remote File Include Vulnerability Vulnerability Scan


Vulnerability Scan Summary
Tries to read a local file using phpBB modules

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a PHP application that is prone to
remote file include attacks.

Description :

The remote host contains a third-party module for phpBB.

The version of at least one such component or module installed on the
remote host fails to sanitize input to the 'phpbb_root_path' parameter
before using it to include PHP code. Provided PHP's
'register_globals' setting is enabled, an unauthenticated attacker may
be able to exploit these flaws to view arbitrary files on the remote
host or to execute arbitrary PHP code, possibly taken from third-party
hosts.

See also :

http://pridels.blogspot.com/2006/05/phpbb-auction-mod-remote-file.html
http://milw0rm.com/exploits/2483
http://milw0rm.com/exploits/2522
http://milw0rm.com/exploits/2525
http://milw0rm.com/exploits/2533
http://milw0rm.com/exploits/2538
http://archives.neohapsis.com/archives/bugtraq/2006-10/0210.html
http://www.phpbb.com/phpBB/viewtopic.php?p=2504370&highlight=#2504370
http://www.securityfocus.com/archive/1/452012/30/0/threaded

Solution :

Disable PHP's 'register_globals' setting or contact the product's
author to see if an upgrade exists.

Threat Level:

High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.