Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.800526 |
Categoría: | Web application abuses |
Título: | AN Guestbook Local File Inclusion Vulnerability |
Resumen: | This host is running AN Guestbook and is prone to Local File Inclusion; vulnerability. |
Descripción: | Summary: This host is running AN Guestbook and is prone to Local File Inclusion vulnerability. Vulnerability Insight: The flaw is due to error in 'g_lang' parameter in 'ang/shared/flags.php' which is not properly verified before being used to include files. Vulnerability Impact: Successful exploitation will allow attacker to include and execute arbitrary files from local and external resources, and can gain sensitive information about remote system directories when register_globals is enabled. Affected Software/OS: AN Guestbook version 0.7 to 0.7.8 Solution: Upgrade to AN Guestbook version 1.2.1 or later. CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N |
Referencia Cruzada: |
BugTraq ID: 35486 Common Vulnerability Exposure (CVE) ID: CVE-2009-2224 http://www.securityfocus.com/bid/35486 http://www.exploit-db.com/exploits/9013 http://www.attrition.org/pipermail/vim/2009-June/002196.html |
Copyright | Copyright (C) 2009 Greenbone Networks GmbH |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |