Korean
<< Back
VID 21346
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The phpMyFAQ program installed on the Web server, according to its version number, has a File Inclusion Vulnerability.
phpMyFAQ is a freely-available FAQ program that uses a MySQL database for Microsoft Windows operating systems. phpMyFAQ versions 1.3.12 and 1.4.0-alpha1 are vulnerable to a File Inclusion Vulnerability, caused by insufficient sanitization of user-supplied data via the 'action' parameter. By passing a relative path to a file and concatenating the path with a '\0' string terminator, a remote attacker could view any file on the system which is accessible and under some circumstances, result in arbitrary PHP code execution if the attacker is able to inject PHP code into known files.

* Note: This check solely relied on the version number of the remote phpMyFAQ program to assess this vulnerability, so this might be a false positive.

* References:
http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0906.html
http://www.osvdb.org/displayvuln.php?osvdb_id=6300

* Platforms Affected:
Thorsten Rinne, phpMyFAQ 1.3.12 and earlier
Thorsten Rinne, phpMyFAQ 1.4.0-alpha1 and earlier
Microsoft Windows Any version
Recommendation Upgrade to the latest version (1.3.13 or later or 1.4.0 alpha2) of phpMyFAQ, available from the phpMyFAQ Download site at http://www.phpmyfaq.de/download.php
Related URL CVE-2004-2255 (CVE)
Related URL 10374 (SecurityFocus)
Related URL 16177 (ISS)