Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> boastMachine Remote Arbitrary File Upload Vulnerability


Vulnerability Assessment Details

boastMachine Remote Arbitrary File Upload Vulnerability

Vulnerability Assessment Summary
Checks for remote arbitrary file upload vulnerability in boastMachine

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains a PHP script that is affected by an
arbitrary file upload vulnerability.

Description :

The remote host is running boastMachine, an open-source publishing
tool written in PHP.

According to its banner, the version of boastMachine installed on the
remote host permits authenticated users to upload arbitrary files and
then run them subject to the rights of the web server user.

See also :

http://www.kernelpanik.org/docs/kernelpanik/bmachines.txt
http://boastology.com/pages/changes.php

Solution :

Upgrade to boastMachine version 3.1 or later.

Network Security Threat Level:

Medium / CVSS Base Score : 4
(AV:R/AC:L/Au:R/C:P/A:P/I:P/B:N)

Networks Security ID: 13600

Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security

Cables, Connectors

KNOPPIX 8.1 LINUX LIVE DVD - 2018
$6.99
KNOPPIX 8.1 LINUX LIVE DVD - 2018 pictureKnoppix Linux , 32 Bit
$5.99
Knoppix Linux , 32 Bit pictureKNOPPIX 8.1 LINUX LIVE DVD - 2018
$5.95
KNOPPIX 8.1 LINUX LIVE DVD - 2018 pictureKnoppix 8.2
$4.99
Knoppix 8.2 picture


Discussions

No Discussions have been posted on this vulnerability.