Nessus Plugin #16075
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
[GLSA-200412-27] PHProjekt: Remote code execution vulnerability
- Family:
- Gentoo Local Security Checks
- Category:
- infos
- Copyright:
- (C) 2004 Michel Arboi
- Summary:
- PHProjekt: Remote code execution vulnerability
- Version:
- $Revision: 1.1 $
- Cve_id:
- -
- Bugtraq_id:
- -
- Xrefs:
- GLSA:200412-27
- Description:
- The remote host is affected by the vulnerability described in GLSA-200412-27
(PHProjekt: Remote code execution vulnerability)
cYon discovered that the authform.inc.php script allows a remote
user to define the global variable $path_pre.
Impact
A remote attacker can exploit this vulnerability to force
authform.inc.php to download and execute arbitrary PHP code with the
privileges of the web server user.
Workaround
There is no known workaround at this time.
References:
http://www.phprojekt.com/modules.php?op=modload&name=News&file=article&sid=193&mode=thread&order=0
Solution:
All PHProjekt users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/phprojekt-4.2-r2"
Risk factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.