Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain a shell remotely >> Discuz! <= 4.0.0 rc4 Arbitrary File Upload Flaw


Vulnerability Assessment Details

Discuz! <= 4.0.0 rc4 Arbitrary File Upload Flaw

Vulnerability Assessment Summary
Checks Discuz! version

Detailed Explanation for this Vulnerability Assessment

The remote host is using Discuz!, a popular web application forum in
China.

According to its version, the installation of Discuz! on the remote host
fails to properly check for multiple extensions in uploaded files. An
attacker may be able to exploit this issue to execute arbitrary commands
on the remote host subject to the rights of the web server user id,
typically nobody.

See also : http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0440.html
Solution : Upgrade to the latest version of this software.
Network Security Threat Level: Medium

Networks Security ID: 14564

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 David Maciejak

Cables, Connectors

Plugable USB Type-C Flash Memory Card Reader
$37.94
Plugable USB Type-C Flash Memory Card Reader pictureCreative Waterproof USB 2.0 Flash Drive Memory Storage Thumb U Disk Blue
$8.85
Creative Waterproof USB 2.0 Flash Drive Memory Storage Thumb U Disk Blue pictureCreative Waterproof USB 2.0 Flash Drive Memory Storage Thumb U Disk Blue
$8.85
Creative Waterproof USB 2.0 Flash Drive Memory Storage Thumb U Disk Blue pictureCreative Waterproof USB 2.0 Flash Drive Memory Storage Thumb U Disk Blue
$9.48
Creative Waterproof USB 2.0 Flash Drive Memory Storage Thumb U Disk Blue picture


Discussions

No Discussions have been posted on this vulnerability.