Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Invision PowerBoard code injection


Vulnerability Assessment Details

Invision PowerBoard code injection

Vulnerability Assessment Summary
Checks for root_path include flaw in ipchat.php

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains a PHP script that is prone to a remote
file include attack.

Description :

It is possible to make the remote host include PHP files hosted on a
third-party server using Invision Power Board.

A possible hacker may use this flaw to inject arbitrary code in the remote
host and gain a shell with the rights of the web server.

Solution :

Unknown at this time.

See also :

http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0099.html

Network Security Threat Level:

High / CVSS Base Score : 7
(AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N)

Networks Security ID: 6976, 7204

Vulnerability Assessment Copyright: This script is Copyright (C) 2003-2006 Renaud Deraison

Cables, Connectors

Juniper Original XFP-10G-E-OC192-IR2-C IPU2AJSRTC FTLX1612M3BCL-J3
$200.0
Juniper Original XFP-10G-E-OC192-IR2-C IPU2AJSRTC FTLX1612M3BCL-J3 pictureJuniper AX411 IEEE 802.11n draft Wireless Access Point - 300 Mbps 1 x Network
$596.84
Juniper AX411 IEEE 802.11n draft Wireless Access Point - 300 Mbps 1 x Network pictureJuniper EX 2200 24P - switch - 24 ports
$50.0
Juniper EX 2200 24P - switch - 24 ports pictureJuniper QFX-QSFP-40G-SR4 740-032986 40GBASE-SR4 Transceiver Avago 40GB SR QSFP+
$95.0
Juniper QFX-QSFP-40G-SR4 740-032986 40GBASE-SR4 Transceiver Avago 40GB SR QSFP+ picture


Discussions

No Discussions have been posted on this vulnerability.