Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:10772
Categoría:Web application abuses
Título:PHP-Nuke copying files security vulnerability (admin.php)
Resumen:Determine if a remote host is vulnerable to the admin.php vulnerability; in PHP-Nuke.
Descripción:Summary:
Determine if a remote host is vulnerable to the admin.php vulnerability
in PHP-Nuke.

Vulnerability Insight:
The remote host seems to be vulnerable to a security problem in
PHP-Nuke (admin.php).

The vulnerability is caused by inadequate processing of queries by PHP-Nuke's admin.php which enables
attackers to copy any file from the operating system to anywhere else on the operating system.

Vulnerability Impact:
Every file that the webserver has access to can be read by anyone.
Furthermore, any file can be overwritten. Usernames (used for database access) can be compromised.
Administrative privileges can be gained by copying sensitive files.

Affected Software/OS:
PHP-Nuke 5.2 and earlier, except 5.0RC1.

Solution:
Upgrade to Version 5.3 or above. As a workaround change the following lines
in admin.php:

if($upload)

To:

if(($upload) && ($admintest))

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: BugTraq ID: 3361
Common Vulnerability Exposure (CVE) ID: CVE-2001-1032
http://www.securityfocus.com/bid/3361
Bugtraq: 20010924 twlc advisory: all versions of php nuke are vulnerable... (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2001-09/0203.html
XForce ISS Database: php-nuke-admin-file-overwrite(7170)
https://exchange.xforce.ibmcloud.com/vulnerabilities/7170
CopyrightCopyright (C) 2001 SecurITeam

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.