|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Multiple Vulnerabilities in phpCOIN 1.2.1b and older Vulnerability Assessment Details
|
Multiple Vulnerabilities in phpCOIN 1.2.1b and older |
||
Detects multiple vulnerabilities in phpCOIN 1.2.1b and older Detailed Explanation for this Vulnerability Assessment Summary : The remote web server contains a PHP application affected by several flaws. Description : The remote host is running phpCOIN version 1.2.1b or older. These versions suffer from several vulnerabilities, among them : - A Local File Include Vulnerability A possible hacker can execute arbitrary code in the context of the web server user by passing the name of a script or file through the 'page' parameter of the 'auxpage.php' script. - Multiple SQL injection vulnerabilities. By calling the 'faq' module with a specially crafted 'faq_id' parameter or the 'pages' or 'site' modules with a specially crafted 'id' parameter, a remote attacker may be able to manipulate SQL queries used by the program, thereby revealing sensitive information or even corrupting the database. - Multiple cross-site scripting vulnerabilities. A remote attacker may be able to inject arbitrary code into the 'helpdesk' and 'mail' modules as well as the 'login.php' script by appending it to a valid request. Successful exploitation may permit a possible hacker to steal authentication cookies or misrepresent site content. See also : http://www.gulftech.org/?node=research&article_id=00065-03292005 http://archives.neohapsis.com/archives/bugtraq/2005-03/0508.html http://forums.phpcoin.com//index.php?showtopic=4210 Solution : Apply the 2005-03-14 fix file or later for phpCOIN v1.2.2. Network Security Threat Level: Medium / CVSS Base Score : 6 (AV:R/AC:H/Au:NR/C:P/A:P/I:P/B:N) Networks Security ID: 12686, 12917 Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security |
||
Cables, Connectors |
WD 2TB Certified Refurbished Elements, External Hard Drive - RWDBU6Y0020BBK-WESN
$49.99
Seagate Exos X16 ST14000NM001G 14TB 512E SATA 6Gb/s 3.5" Enterprise Hard Drive
$157.99
Seagate Exos X22 ST20000NM004E 20TB 512E SATA 6Gb/s 3.5" Enterprise Hard Drive
$268.99
Western Digital 4TB WD Purple Surveillance HDD, Internal Hard Drive - WD43PURZ
$96.99
HGST Ultrastar DC HC520 12TB SATA 6Gb 256MB 3.5" Enterprise HDD- HUH721212ALE601
$82.99
Seagate Exos 7E10 ST2000NM000B 2TB 7200RPM SATA 6.0Gb/s 3.5" Internal Hard Drive
$29.99
HGST Ultrastar HE10 HUH721010ALE600 10TB SATA 6Gb/s 7200RPM 3.5" Enterprise HDD
$69.99
8TB Seagate Archive SATA 3.5" HDD Hard Drive 100% Healthy 200MB/s ST8000AS0002
$36.57
WD 16TB Elements Desktop, Certified Refurbished Hard Drive - RWDBWLG0160HBK-NESN
$174.99
WD 4TB Certified Refurbished Elements, External Hard Drive - RWDBU6Y0040BBK-WESN
$69.99
|
||
No Discussions have been posted on this vulnerability. |