|Category:||Web application abuses|
|Title:||PHP-Nuke copying files security vulnerability (admin.php)|
|Summary:||Determine if a remote host is vulnerable to the admin.php vulnerability; in PHP-Nuke.|
Determine if a remote host is vulnerable to the admin.php vulnerability
The remote host seems to be vulnerable to a security problem in
The vulnerability is caused by inadequate processing of queries by PHP-Nuke's admin.php which enables
attackers to copy any file from the operating system to anywhere else on the operating system.
Every file that the webserver has access to can be read by anyone.
Furthermore, any file can be overwritten. Usernames (used for database access) can be compromised.
Administrative privileges can be gained by copying sensitive files.
PHP-Nuke 5.2 and earlier, except 5.0RC1.
Upgrade to Version 5.3 or above. As a workaround change the following lines
if(($upload) && ($admintest))
BugTraq ID: 3361|
Common Vulnerability Exposure (CVE) ID: CVE-2001-1032
Bugtraq: 20010924 twlc advisory: all versions of php nuke are vulnerable... (Google Search)
XForce ISS Database: php-nuke-admin-file-overwrite(7170)
|Copyright||Copyright (C) 2001 SecurITeam|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.