![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.21020 |
Categoría: | Web application abuses |
Título: | 4Images <= 1.7.1 Directory Traversal Vulnerability |
Resumen: | The remote web server is running 4Images which is prone to; directory traversal attacks. |
Descripción: | Summary: The remote web server is running 4Images which is prone to directory traversal attacks. Vulnerability Insight: The installed application does not validate user-input passed in the 'template' variable of the 'index.php' file. Vulnerability Impact: This allows an attacker to execute directory traversal attacks and display the content of sensitive files on the system and possibly to execute arbitrary PHP code if he can write to local files through some other means. Solution: Sanitize the 'index.php' file. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2006-0899 BugTraq ID: 16855 http://www.securityfocus.com/bid/16855 Bugtraq: 20060301 4images <=1.7.1 remote code execution (Google Search) http://www.securityfocus.com/archive/1/426468/100/0/threaded https://www.exploit-db.com/exploits/1533 http://retrogod.altervista.org/4images_171_adv.html http://www.osvdb.org/23529 http://secunia.com/advisories/19026 http://securityreason.com/securityalert/518 http://www.vupen.com/english/advisories/2006/0754 XForce ISS Database: 4images-template-file-include(24938) https://exchange.xforce.ibmcloud.com/vulnerabilities/24938 |
Copyright | Copyright (C) 2006 Ferdy Riphagen |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |