Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Netref Cat_for_gen.PHP Remote PHP Script Injection Vulnerability


Vulnerability Assessment Details

Netref Cat_for_gen.PHP Remote PHP Script Injection Vulnerability

Vulnerability Assessment Summary
Netref Cat_for_gen.PHP Remote PHP Script Injection Vulnerability

Detailed Explanation for this Vulnerability Assessment

The remote host is running the Netref directory script, written in
PHP.

There is a vulnerability in the installed version of Netref that
enables a remote attacker to pass arbitrary PHP script code through
the 'ad', 'ad_direct', and 'm_for_racine' parameters of the
'cat_for_gen.php' script. This code will be executed on the remote
host under the rights of the web server userid.

Solution : Upgrade to Netref 4.3 or later.
Network Security Threat Level: High

Networks Security ID: 13275

Vulnerability Assessment Copyright: Copyright (C) 2005 Josh Zlatin-Amishav

Cables, Connectors

256GB SSD Samsung 2013 2014 2015 Apple MacBook Pro/Air 11"13"15" MZ-JPU256T/0A6
$215.0
256GB SSD Samsung 2013 2014 2015 Apple MacBook Pro/Air 11Used Otterbox Defender Series Rugged Case for Samsung Galaxy Tab S2 9.7" Black
$47.99
Used Otterbox Defender Series Rugged Case for Samsung Galaxy Tab S2 9.7Bundle Samsung Galaxy Tab A 7.0" 8GB Tablet Wifi Android SM-T280 Black
$69.94
Bundle Samsung Galaxy Tab A 7.0New Generic Toner for Samsung CTL-505 for Proexpress C2620 C2670 C2680FX Magenta
$29.99
New Generic Toner for Samsung CTL-505 for Proexpress C2620 C2670 C2680FX Magenta picture


Discussions

No Discussions have been posted on this vulnerability.