|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Phpauction <= 2.5 Multiple Vulnerabilities Vulnerability Assessment Details
|
Phpauction <= 2.5 Multiple Vulnerabilities |
||
Checks for multiple vulnerabilities in Phpauction <= 2.5 Detailed Explanation for this Vulnerability Assessment Summary : The remote web server contains a PHP application that is affected by multiple vulnerabilities. Description : The remote host is running Phpauction or one of its affiliate versions, such as Web2035 Auction. Phpauction is a web-based auction system written in PHP. The version of Phpauction on the remote host suffers from multiple flaws : - Remote Code Execution A possible hacker can control the 'lan' variable used to include PHP code in the 'index.php' and 'admin/index.php' scripts, which _may_ permit him to view arbitrary files on the remote host and execute arbitrary PHP code, possibly even taken from third-party hosts. - Authentication Bypass By setting the cookie 'PHPAUCTION_RM_ID' to the id of an existing user, a possible hacker can bypass authentication. - SQL Injection The application does not properly sanitize user-supplied input to the 'category' parameter of the 'adsearch.php' script before using it in database queries. - Multiple Cross-Site Scripting Flaws The application fails to sanitize user-supplied input to several scripts before using it in dynamically- generated pages, which permits for cross-site scripting attacks. See also : http://securitytracker.com/alerts/2005/Jul/1014423.html Solution : Unknown at this time. Network Security Threat Level: Medium / CVSS Base Score : 6 (AV:R/AC:H/Au:NR/C:P/A:P/I:P/B:N) Networks Security ID: 14184 Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security |
||
Cables, Connectors |
ASUS H110M-R Motherboard Intel 6th/7th Gen LGA1151 DDR4 Micro-ATX i/o shield
$42.00
***NEW*** BCM RX67Q Gaming Motherboard | Intel Q67 2nd/3rd Gen. | LGA1155 | DDR3
$29.77
Micro ATX Desktop Motherboard ASUS H110M-C LGA 1151
$31.95
Asrock Z390 Phantom Gaming 4S/AC Wifi 8th/9th Gen Intel 1151 Motherboard Bulk
$47.55
ASUS Prime Z390-A LGA 1151 Intel Z390 SATA USB 3.1 ATX Motherboard NO I/O
$99.00
MSI B450M PRO-VDH MAX AM4 AMD B450 USB3.2 Micro-ATX Motherboard
$67.99
ASUS Prime Q270M-C LGA1151 DP HDMI VGA SATA 6GB/s USB 3.0 MicroATX Motherboard
$34.19
X99 LGA 2011-v3 MR9D Motherboard 8*DDR4 RAM USB 3.0 SATA3.0 M.2 for E5 V3 V4 CPU
$79.99
BTC-S37 Mining Motherboard Kit /w SSD & Ram Preinstalled
$59.99
GIGABYTE MB10-Datto Motherboard Xeon D-1521- SR2DF 2.40 GHz- Open Box
$121.50
|
||
No Discussions have been posted on this vulnerability. |