Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> PHProjekt Unspecified Authentication Bypass Vulnerability


Vulnerability Assessment Details

PHProjekt Unspecified Authentication Bypass Vulnerability

Vulnerability Assessment Summary
Uses a form-POST method to enter the configuration page

Detailed Explanation for this Vulnerability Assessment

The remote host is running PHProjekt, open-source PHP Groupware
package. It runs on most Linux and Unix variants, in addition
to Microsoft Windows operating systems.

An unspecified authentication bypass vulnerability is present in the
'setup.php' source file and may be exploited by a remote attacker to gain
access to the 'setup.php' file without requiring authentication. The
'setup.php' file may then be employed to make administrative
configuration changes to the PHPProjekt website.

Solution : Upgrade setup.php to the fixed version - setup.php,v 1.3
Network Security Threat Level: High

Networks Security ID: 11797

Vulnerability Assessment Copyright: This script is Copyright (C) 2004-2007 Tenable Network Security

Cables, Connectors

Vintage dtk PC AT 150v power supply PIP-151A Retro PC PSU for IBM 5160
$35.0
Vintage dtk PC AT 150v power supply PIP-151A Retro PC PSU for IBM 5160 pictureVintage TeleVideo
$530.0
Vintage TeleVideo  pictureApple 17" Studio Display LCD Monitor - Model 7649 Vintage - beautiful condition
$16.6
Apple 17Vintage Apple Keyboard II for Macintosh II and Apple Desktop M0487 very nice.
$19.99
Vintage Apple Keyboard II for Macintosh II and Apple Desktop M0487 very nice. picture


Discussions

No Discussions have been posted on this vulnerability.