Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
phpBB: Multiple vulnerabilities
Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200503-02
(phpBB: Multiple vulnerabilities)
It was discovered that phpBB contains a flaw in the session
handling code and a path disclosure bug. AnthraX101 discovered that
phpBB permits local users to read arbitrary files, if the "Enable remote
avatars" and "Enable avatar uploading" options are set (CVE-2005-0259).
He also found out that incorrect input validation in
"usercp_avatar.php" and "usercp_register.php" makes phpBB vulnerable to
directory traversal attacks, if the "Gallery avatars" setting is
Remote attackers can exploit the session handling flaw to gain
phpBB administrator rights. By providing a local and a remote location
for an avatar and setting the "Upload Avatar from a URL:" field to
point to the target file, a malicious local user can read arbitrary
local files. By inserting "/../" sequences into the "avatarselect"
parameter, a remote attacker can exploit the directory traversal
vulnerability to delete arbitrary files. A flaw in the "viewtopic.php"
script can be exploited to expose the full path of PHP scripts.
There is no known workaround at this time.
All phpBB users should upgrade to the latest available version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/phpBB-2.0.13"
Network Security Threat Level: Medium
Networks Security ID:
Vulnerability Assessment Copyright: (C) 2005 Michel Arboi
|IBM ADP ETHERNET DUAL PORT SERVER
|Well Maintained IBM System X3500 M4 Tower Server Machine Type 7383 AC1
|ibm 49y4240 rr intel ethernet quad port server adapter i340 t4 f/system x
|IBM Lenovo TD340 Tower Server Intel® Xeon® E5-2403 2x900GB 10k SAS 32gb DDR3
No Discussions have been posted on this vulnerability.