Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain a shell remotely >> Discuz! <= 4.0.0 rc4 Arbitrary File Upload Flaw


Vulnerability Assessment Details

Discuz! <= 4.0.0 rc4 Arbitrary File Upload Flaw

Vulnerability Assessment Summary
Checks Discuz! version

Detailed Explanation for this Vulnerability Assessment

The remote host is using Discuz!, a popular web application forum in
China.

According to its version, the installation of Discuz! on the remote host
fails to properly check for multiple extensions in uploaded files. An
attacker may be able to exploit this issue to execute arbitrary commands
on the remote host subject to the rights of the web server user id,
typically nobody.

See also : http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0440.html
Solution : Upgrade to the latest version of this software.
Network Security Threat Level: Medium

Networks Security ID: 14564

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 David Maciejak

Cables, Connectors

OEM Samsung NP700G Series Intel Motherboard BA92-09080A BA92-09080B
$55.0
OEM Samsung NP700G Series Intel Motherboard BA92-09080A BA92-09080B picture1PCS 100% test SGDS-30A75ARY533 (DHL or EMS 90days Warranty) #DZY
$1500.0
1PCS 100% test SGDS-30A75ARY533 (DHL or EMS 90days Warranty) #DZY pictureASUS H87-PLUS, LGA 1150, Intel Motherboard
$85.0
ASUS H87-PLUS, LGA 1150, Intel Motherboard picture1PCS 100% test Yamatake C36TV0UA1200 Thermostat (DHL or EMS 90days Warranty)#CZJ
$318.0
1PCS 100% test Yamatake C36TV0UA1200 Thermostat (DHL or EMS 90days Warranty)#CZJ picture


Discussions

No Discussions have been posted on this vulnerability.