Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> PhpGroupWare unspecified remote file include vulnerability


Vulnerability Assessment Details

PhpGroupWare unspecified remote file include vulnerability

Vulnerability Assessment Summary
Checks for PhpGroupWare version

Detailed Explanation for this Vulnerability Assessment

The remote host seems to be running PhpGroupWare, is a multi-user groupware
suite written in PHP.

This version is prone to a vulnerability that may permit remote attackers,
without prior authentication, to include and execute malicious PHP scripts.
Remote users may influence URI variables to include a malicious PHP script
on a remote system, it is possible to cause arbitrary PHP code to be executed.

Solution : Update to version 0.9.14.006 or newer

See also: http://www.phpgroupware.org/

Network Security Threat Level: Medium

Networks Security ID: 8265

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 David Maciejak

Cables, Connectors

job lot 2.5" Laptop HDD mixed gig see pic
$99.9
job lot 2.5EMC HDD 600GB 15K SAS 6GB 3.5 VNX 005050927 V4-VS15-600 VX-VS15-600 V3-VS15-600
$37.56
EMC HDD 600GB 15K SAS 6GB 3.5 VNX 005050927 V4-VS15-600 VX-VS15-600 V3-VS15-600 pictureWD 652998-001 SATA HDD 500GB 6G 7200 RPM 3.5" WD5003ABYX Western Digital
$31.31
WD 652998-001 SATA HDD 500GB 6G 7200 RPM 3.5IBM 32P0727 73.4 GB 10K RPM SCSI - eserver xSeries
$79.59
IBM 32P0727 73.4 GB 10K RPM SCSI - eserver xSeries picture


Discussions

No Discussions have been posted on this vulnerability.