Korean
<< Back
VID 210083
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The GuppY program is vulnerable to a remote file include vulnerability via the 'selskin' parameter. GuppY is a CMS (Content Management System) written in PHP that doesn't require any database to run. GuppY versions 4.6.3 and earlier are vulnerable to a remote file include vulnerability, caused by input validation errors in the 'inc/includes.inc' and 'inc/boxleft.inc' scripts when processing the 'selskin' parameter. By sending a specially-crafted URL request to the 'index.php' script using the 'selskin' parameter, regardless of PHP's 'register_globals' setting, a remote attacker could exploit this vulnerability to execute arbitrary PHP code with the privileges of the web server.

* References:
http://www.frsirt.com/english/advisories/2007/3750
http://secunia.com/advisories/23914
http://www.milw0rm.com/exploits/4602

* Platforms Affected:
GuppY versions 4.6.3 and earlier
Any operating system Any version
Recommendation Upgrade to the latest version of GuppY (4.6.4 or later), available from the GuppY Web site at http://www.freeguppy.org/?lng=en
Related URL CVE-2007-5844 (CVE)
Related URL 26315 (SecurityFocus)
Related URL 38256 (ISS)