![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.51445 |
Categoría: | Conectiva Local Security Checks |
Título: | Conectiva Security Advisory CLA-2003:703 |
Resumen: | NOSUMMARY |
Descripción: | Description: The remote host is missing updates announced in advisory CLA-2003:703. phpGroupWare[1] is a web-based groupware suite written in PHP. A vulnerability that allows a remote attacker to execute php code in the context of the web server was found in phpgroupware. The vulnerability consists of a failure to handle some variables passed through URLs and allows a remote attacker to run arbitrary code by sending a URL which points[2] to a php file (possibly hosted in other server) containing such code. This vulnerability was fixed in phpGroupware 0.9.14.006, which is the version included in this update. Solution: The apt tool can be used to perform RPM package upgrades by running 'apt-get update' followed by 'apt-get upgrade' http://www.phpgroupware.org/ http://www.securityfocus.com/archive/1/329910 https://secure1.securityspace.com/smysecure/catid.html?in=CLA-2003:703 http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002003 Risk factor : High |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |