|
Family: CGI abuses --> Category: attack
phpMyFAQ < 1.6.10 File Upload Vulnerability Vulnerability Scan
Vulnerability Scan Summary Tries to bypass authentication with phpMyFAQ's ImageManager plugin
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP application that is affected by
privilege escalation issues.
Description :
The installation of phpMyFAQ on the remote host allows for bypassing
authentication or escalating rights via the 'admin/attachment.php'
and 'admin/editor/tests/ImageManager/images.php' scripts. By
leveraging these issues, a remote attacker can upload files, possibly
even containing arbitary code, subject to the rights of the web
server user id.
Note that successful exploitation of these issues requires that PHP's
'register_globals' setting be enabled.
See also :
http://www.phpmyfaq.de/advisory_2007-02-18.php
Solution :
Upgrade to phpMyFAQ 1.6.10 or later.
Threat Level:
Medium / CVSS Base Score : 5.6
(AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|