![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.901090 |
Categoría: | Web application abuses |
Título: | PHP-Calendar Multiple Remote And Local File Inclusion Vulnerabilities |
Resumen: | PHP-Calendar is prone to Remote And Local File Inclusion vulnerability. |
Descripción: | Summary: PHP-Calendar is prone to Remote And Local File Inclusion vulnerability. Vulnerability Insight: The flaw is due to error in 'configfile' parameter in 'update08.php' and 'update10.php' which is not properly verified before being used to include files. Vulnerability Impact: Successful exploitation will allow attacker to include and execute arbitrary files from local and external resources, and can gain sensitive information about remote system directories when register_globals is enabled. Affected Software/OS: PHP-Calendar version 1.1 and prior on all platforms. Solution: Upgrade to PHP-Calendar version 1.4 or later. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-3702 Bugtraq: 20091218 [ISecAuditors Security Advisories] PHP-Calendar <= v1.1 'configfile' Remote and Local File Inclusion vulnerability (Google Search) http://www.securityfocus.com/archive/1/508548/100/0/threaded |
Copyright | Copyright (C) 2009 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |