Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> 'Les Visiteurs' script injection


Vulnerability Assessment Details

'Les Visiteurs' script injection

Vulnerability Assessment Summary
Les Visiteurs inc file upload

Detailed Explanation for this Vulnerability Assessment

The remote 'Les Visiteurs' PHP scripts are vulnerable to a bug
wherein any anonymous user can force the server to redirect to
any arbitrary IP and download a potentially malicious include file.

This can permit a possible hacker to upload and execute malicious
code on the web server.

Solution: Upgrade to version 2.0.2 - http://chezwam.net/main/publications/lesvisiteurs/
Network Security Threat Level: High

Networks Security ID: 8902

Vulnerability Assessment Copyright: This script is Copyright (C) 2003-2006 Tenable Network Security

Cables, Connectors

Kingston M2 SSD 128gb drive
$69.0
Kingston M2 SSD 128gb drive picture250GB Samsung 970 EVO NVMe M.2 Solid State Drive - never used
$35.0
250GB Samsung 970 EVO NVMe M.2 Solid State Drive - never used pictureQNAP TS-853U NAS with qty 4 (4tb drives), qty 3 (2TB drives) and qty1 128 SSD 
$500.0
QNAP TS-853U NAS with qty 4 (4tb drives), qty 3 (2TB drives) and qty1 128 SSD  pictureSySTOR 1:4 SATA 3.5" Rackmount Hard Disk Drive HDD/SSD Duplicator Cloner-300MB/s
$2332.25
SySTOR 1:4 SATA 3.5


Discussions

No Discussions have been posted on this vulnerability.