|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Dragonfly CMS currentlang Parameter Local File Include Vulnerability Vulnerability Assessment Details
|
Dragonfly CMS currentlang Parameter Local File Include Vulnerability |
||
Checks for currentlang parameter local file include vulnerability in Dragonfly CMS Detailed Explanation for this Vulnerability Assessment Summary : The remote web server contains a PHP script that is affected by a local file include issue. Description : The remote host appears to be running Dragonfly / CPG-Nuke CMS, a content management system written in PHP. The installed version of Dragonfly / CPG-Nuke CMS fails to validate user input to the 'getlang' parameter as well as the 'installlang' cookie before using them in the 'install.php' script in PHP 'require()' functions. An unauthenticated attacker can leverage this issue to view arbitrary files on the remote host and possibly to execute arbitrary PHP code taken from files on the remote host, both subject to the rights of the web server user id. Note that successful exploitation is not affected by PHP's 'register_globals' and 'magic_quotes_gpc' settings. See also : http://retrogod.altervista.org/dragonfly9.0.6.1_incl_xpl.html http://www.securityfocus.com/archive/1/424439/30/0/threaded http://dragonflycms.org/Forums/viewtopic/p=98034.html Solution : Remove the affected 'install.php' script. Network Security Threat Level: High / CVSS Base Score : 7 (AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N) Networks Security ID: 16546 Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security |
||
Cables, Connectors |
Dell PowerEdge M610 Blade Server E5620@2.2GHZ (6x)8GB RAM (2x)146GB 15K SAS HDD
$75.00
Dell PowerEdge FX2 FX2S Enclosure - 4x PowerEdge FC640 w/ 8x Gold 6132 112C 1TB
$2294.99
Dell PowerEdge FX2 FX2S Enclosure - 4x PowerEdge FC640 w/ 8x Gold 6134 64C 1TB
$3299.99
HP ProLiant BL460c G8(Gen8) 2x 8 CORE E5-2670 2.6GHz 192GB RAM 2x 146GB SAS HDD
$78.00
DELL M630 BLADE SERVER x2 XEON E5-2660V3 @ 2.6GH H730 PERC HDD CADDIES 16GB FC
$50.00
DELL POWEREDGE M620 Blade 2x Xeon E5-2670 2.5GHz 128GB 2x300GB HDD
$94.50
Dell PowerEdge FC630 Xeon E5-2699 v4 256 GB DDR4 1U Server No Drives/No OS B9
$424.99
Dell PowerEdge M620 Blade Server
$39.99
Cisco UCS 5108 Blade Server Chassis Enclosure 8x B200 M4 16x E5-2640v3 128gb
$599.99
Dell PowerEdge FX2s CTO Blade 4 Slot 2U Chassis 2x 2000W
$349.00
|
||
No Discussions have been posted on this vulnerability. |