Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.100734
Categoría:Web application abuses
Título:PHP Traverser 'mp3_id.php' Remote File Include Vulnerability
Resumen:PHP Traverser is prone to a remote file-include vulnerability because;it fails to properly sanitize user-supplied input.;;An attacker can exploit this vulnerability to obtain potentially;sensitive information or to execute arbitrary script code in the;context of the webserver process. This may allow the attacker to;compromise the application and the computer. Other attacks are;also possible.;;PHP Traverser 0.8.0 is vulnerable. Other versions may also be;affected.
Descripción:Summary:
PHP Traverser is prone to a remote file-include vulnerability because
it fails to properly sanitize user-supplied input.

An attacker can exploit this vulnerability to obtain potentially
sensitive information or to execute arbitrary script code in the
context of the webserver process. This may allow the attacker to
compromise the application and the computer. Other attacks are
also possible.

PHP Traverser 0.8.0 is vulnerable. Other versions may also be
affected.

Solution:
No known solution was made available for at least one year
since the disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features,
remove the product or replace the product by another one.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: BugTraq ID: 41899
Common Vulnerability Exposure (CVE) ID: CVE-2009-4085
http://osvdb.org/60466
http://secunia.com/advisories/37455
XForce ISS Database: phptraverser-mp3id-file-include(54378)
https://exchange.xforce.ibmcloud.com/vulnerabilities/54378
CopyrightCopyright (C) 2010 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.