Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> PhpGroupWare index.php HTML injection vulnerabilities


Vulnerability Assessment Details

PhpGroupWare index.php HTML injection vulnerabilities

Vulnerability Assessment Summary
Checks for PhpGroupWare version

Detailed Explanation for this Vulnerability Assessment

The remote host seems to be running PhpGroupWare, a multi-user groupware
suite written in PHP.

This version has been reported prone to HTML injection vulnerabilities
through 'index.php'. These issues present themself due to a lack of
sufficient input validation performed on form fields used by
PHPGroupWare modules.

A malicious attacker may inject arbitrary HTML and script code using
these form fields that may be incorporated into dynamically generated
web content.

Solution : Update to version 0.9.16 RC3 or newer

See also: http://www.phpgroupware.org/

Network Security Threat Level: Medium

Networks Security ID: 12082

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 David Maciejak

Cables, Connectors

1pc used EAO Emergency Stop Switch 84-5040.0040
$20.0
1pc used  EAO Emergency Stop Switch 84-5040.0040 picture1pc used EAO Emergency Stop Switch 84-5040.0040
$20.0
1pc used  EAO Emergency Stop Switch 84-5040.0040 pictureDELL Optiplex 740 Mini Tower 0TT708 Motherboard with AMD Athlon 4200
$9.99
DELL Optiplex 740 Mini Tower 0TT708 Motherboard with AMD Athlon 4200 pictureNEW I/O Shield For Biostar TZ75B Motherboard Backplate
$7.94
NEW I/O Shield For Biostar TZ75B Motherboard Backplate picture


Discussions

No Discussions have been posted on this vulnerability.