Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks for multiple vulnerabilities in yappa-ng < 2.3.2
Detailed Explanation for this Vulnerability Assessment
The remote web server contains several PHP scripts that are prone to
multiple flaws, including arbitrary file inclusion.
The version of yappa-ng installed on the remote host is prone to
multiple file include and cross-site scripting vulnerabilities due to
its failure to sanitize user-supplied script input when calling
various include scripts directly.
By exploiting the file include vulnerabilities, a possible hacker can read
arbitrary files on the remote host and possibly even run arbitrary
code, subject to the rights of the web server process. And by
exploiting the cross-site scripting vulnerabilities, he can cause
arbitrary script and HTML code to be run in a user's browser within
the context of the affected web site.
See also :
Upgrade to yappa-ng 2.3.2 or later.
Network Security Threat Level:
Medium / CVSS Base Score : 6
Networks Security ID: 13371, 13372, 19823
Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security
|XYRATEX IBM HS-1235T 12 BAY RAID / FREENAS Server 1x E5645 2.4GHz / 24GB / 36TB*
|IBM X3550 M3 Server Intel Xeon @ 2.13Ghz 4GB 1TB HDD Win 2016 STD LSI SAS2290-8I
|XYRATEX IBM HS-1235T 12 BAY RAID / FREENAS Server 1x E5645 2.4GHz / 48GB / 72TB*
|IBM x3650 M2 Server 1x Xeon E5530 QC 2,4GHz/48GB RAM/3x 300GB HDD
No Discussions have been posted on this vulnerability.