Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Tries to upload a file with PHP code using Geeklog's FCKeditor
Detailed Explanation for this Vulnerability Assessment
The remote web server contains a PHP application that is affected by
an arbitrary file upload vulnerability.
The remote host is running Geeklog, an open-source weblog powered by
PHP and MySQL.
The version of Geeklog installed on the remote host includes an older
version of FCKeditor that is enabled by default and permits an
unauthenticated attacker to upload arbitrary files containing, say,
PHP code, and then to execute them subject to the rights of the
web server user id.
See also :
Upgrade to Geeklog 1.4.0sr4 or later or disable FCKeditor as discussed
in the first vendor advisory above.
Network Security Threat Level:
Medium / CVSS Base Score : 5.6
Networks Security ID: 18767
Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security
|Toshiba THNSNK256GVN8 M.2 2280 256GB Solid State Drive SSD
|Toshiba THNSN5512GPU7 M.2 2280 NVMe 512 GB SSD Drive 512GB Hard Drive
No Discussions have been posted on this vulnerability.