Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Tries to read an invalid XML file with Feedsplitter
Detailed Explanation for this Vulnerability Assessment
The remote web server contains a PHP application that is affected by
The remote host is running Feedsplitter, a PHP script for converting
RSS / RDF feeds into HTML.
The version of Feedsplitter installed on the remote host fails to
properly validate the 'format' parameter of the 'feedsplitter.php'
script before using it to parse an arbitrary XML file. An
unauthenticated attacker may be able to exploit this to discover the
contents of XML files or potentially even execute arbitrary PHP code.
In addition, the application can optionally disclose the source of
feeds and may permit for arbitrary PHP code execution through the use
of a malicious feed.
See also :
Unknown at this time.
Network Security Threat Level:
High / CVSS Base Score : 7.0
Networks Security ID: 19779
Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security
|Mini High Speed USB 2.0 Micro SD TF T-Flash Memory Card Reader Adapter For PC
|NEW 64MB USB 2.0 Flash Memory Stick Storage Disk Gift Thumb pen drive Premium GA
No Discussions have been posted on this vulnerability.