Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> myPHPNuke phptonuke.php Directory Traversal


Vulnerability Assessment Details

myPHPNuke phptonuke.php Directory Traversal

Vulnerability Assessment Summary
Reads file through phptonuke.php

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains a PHP script that permits for reading of
arbitrary files.

Description :

The version of myPHPNuke installed on the remote host permits anyone to
read arbitrary files by passing the full filename to the 'filnavn'
argument of the 'phptonuke.php' script.

See also :

http://marc.theaimsgroup.com/?l=bugtraq&m=103480589031537&w=2

Solution :

Upgrade to the latest version.

Network Security Threat Level:

Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)

Networks Security ID: 5982

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Michel Arboi

Cables, Connectors

HP 013233-001 Smart Array P400 PCIe Dual-Port SAS RAID Controller Card
$4.99
HP 013233-001 Smart Array P400 PCIe Dual-Port SAS RAID Controller Card pictureHighPoint RocketRAID 3740A/840A SAS 12Gb/s PCI-Express 3.0 x8 RAID Controller
$141.99
HighPoint RocketRAID 3740A/840A SAS 12Gb/s PCI-Express 3.0 x8 RAID Controller pictureHighPoint RocketRAID 3520 3520LF PCI-Express to SATA II RAID Host Adapter
$24.99
HighPoint RocketRAID 3520 3520LF PCI-Express to SATA II RAID Host Adapter pictureDell 0XXFVX PowerEdge PERC H700 6Gb/s SAS RAID Controller Card XXFVX
$24.99
Dell 0XXFVX PowerEdge PERC H700 6Gb/s SAS RAID Controller Card XXFVX picture


Discussions

No Discussions have been posted on this vulnerability.