27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

exploitation, the attacker would be able to execute arbitrary commands with the rights of<br />

the web server.<br />

Solution: Upgrade to version 7.13.1 or higher.<br />

CVE-2005-0490<br />

phpBB < 2.0.12 Path Disclosure / Unauthorized unlink() Function Access<br />

<strong>PVS</strong> ID: 2641 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running phpBB, a web-based forum application written in PHP. There is a flaw in this<br />

version of phpBB that will allow a remote attacker to disclose paths. This sort of<br />

information may be useful for further attacks.\nThere is another flaw within the<br />

usercp_avatar.php script that would allow a remote user to pass arbitrary files to the<br />

unlink() function. The unlink() function deletes files. A successful attack would delete<br />

arbitrary files on the web server.<br />

Solution: Upgrade to version 2.0.12 or higher.<br />

CVE-2005-0259<br />

vBulletin < 3.0.7 misc.php PHP Code Injection<br />

<strong>PVS</strong> ID: 2642 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running a version of vBulletin, a forum application implemented in PHP, that is<br />

vulnerable to a flaw in the misc.php script. The flaw allows a remote attacker the ability to<br />

execute PHP code on the server. An attacker exploiting this flaw would pass malformed<br />

data to the 'template' parameter of the misc.php script.<br />

Solution: Upgrade to version 3.0.7 or higher.<br />

CVE-2005-0511<br />

PBLang Bulletin Board Multiple HTML Injection and XSS<br />

<strong>PVS</strong> ID: 2643 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17209<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running PBLang, a bulletin board system written in PHP. This version of PBLang is<br />

vulnerable to a remote Cross-Site Scripting (XSS) flaw. In addition, this version of PBLang<br />

is vulnerable to an HTML injection flaw within the pmpshow.php script. An attacker<br />

exploiting these flaws would be need to be able to convince a user to click on a malicious<br />

URL. Upon successful exploitation, the attacker would be able to steal credentials or<br />

execute code within the browser. A third flaw, which does not require user interaction, has<br />

Family Internet Services 675

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!