Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> CGI abuses >> SysCP < 1.2.11 Multiple Script Execution Vulnerabilities

Vulnerability Assessment Details

SysCP < 1.2.11 Multiple Script Execution Vulnerabilities

Vulnerability Assessment Summary
Checks for multiple script execution vulnerabilities in SysCP < 1.2.11

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains a PHP script that is affected by remote
code execution vulnerabilities.

Description :

The remote host is running SysCP, an open-source control panel written
in PHP.

The version of SysCP installed on the remote host uses user-supplied
input to several variables in various scripts without sanitizing it.
Provided PHP's 'register_globals' setting is enabled, a possible hacker can
exploit these flaws to pass arbitrary PHP code to the application's
internal template engine for execution or to affect the application's
use of include files.

See also :

Solution :

Upgrade to SysCP version 1.2.11 or later.

Network Security Threat Level:

High / CVSS Base Score : 7

Networks Security ID: 14490

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

4GB 3 pk USB Flash Drive
4GB 3 pk USB Flash Drive picture128GB USB Flash Drive
128GB USB Flash Drive picture128GB Ultra Fit USB Flash Driv
128GB Ultra Fit USB Flash Driv picture


No Discussions have been posted on this vulnerability.