Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> php POST file uploads


Vulnerability Assessment Details

php POST file uploads

Vulnerability Assessment Summary
Checks for version of PHP

Detailed Explanation for this Vulnerability Assessment

The remote host is running a version of PHP earlier
than 4.1.2.

There are several flaws in how PHP handles
multipart/form-data POST requests, any one of which can
permit a possible hacker to gain remote access to the system.

Solution : Upgrade to PHP 4.1.2
Network Security Threat Level: High

Networks Security ID: 4183

Vulnerability Assessment Copyright: This script is Copyright (C) 2002 Thomas Reinke

Cables, Connectors

Juniper PIC-10GE-XENPAK-D 10Gbase-XENPAK module PC-1XGE-XENPAK
$99.99
Juniper PIC-10GE-XENPAK-D 10Gbase-XENPAK module PC-1XGE-XENPAK pictureJuniper mic-3d-20ge-sfp Interface Module Card
$1099.99
Juniper mic-3d-20ge-sfp Interface Module Card pictureJuniper Networks MIC-3D-20GE-SFP Modular Interface Card
$1499.99
Juniper Networks MIC-3D-20GE-SFP Modular Interface Card pictureJuniper Networks ACX1100-AC Router: JUNOS 17.1R1.8; Up to 60 Gbps throughput
$1255.0
Juniper Networks ACX1100-AC Router: JUNOS 17.1R1.8; Up to 60 Gbps throughput picture


Discussions

No Discussions have been posted on this vulnerability.