Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain a shell remotely >> Discuz! <= 4.0.0 rc4 Arbitrary File Upload Flaw


Vulnerability Assessment Details

Discuz! <= 4.0.0 rc4 Arbitrary File Upload Flaw

Vulnerability Assessment Summary
Checks Discuz! version

Detailed Explanation for this Vulnerability Assessment

The remote host is using Discuz!, a popular web application forum in
China.

According to its version, the installation of Discuz! on the remote host
fails to properly check for multiple extensions in uploaded files. An
attacker may be able to exploit this issue to execute arbitrary commands
on the remote host subject to the rights of the web server user id,
typically nobody.

See also : http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0440.html
Solution : Upgrade to the latest version of this software.
Network Security Threat Level: Medium

Networks Security ID: 14564

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 David Maciejak

Cables, Connectors

WD Elements 2TB External Hard Drive USB HDD Western Digital
$34.88
WD Elements 2TB External Hard Drive USB HDD Western Digital pictureApple Macbook Pro 15" A1286 Early 2011 HDD Bracket W Cable 821-1198-A
$8.5
Apple Macbook Pro 15Dell OEM Vostro 3568 Vegas15 HDD FFC Cable - 450.09P04.0001
$14.9
Dell OEM Vostro 3568 Vegas15 HDD FFC Cable - 450.09P04.0001 pictureMZ-76Q1T0 Samsung 860 QVO Series 1TB 2.5 inch SATA3 SSD
$95.0
MZ-76Q1T0 Samsung 860 QVO Series 1TB 2.5 inch SATA3 SSD picture


Discussions

No Discussions have been posted on this vulnerability.