Korean
<< Back
VID 21410
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The phpGroupWare, according to its version number, has the 'phpgw.inc.php' Command Execution Vulnerability.
phpGroupWare, developed by Joseph Engo, is a PHP-based groupware suite that includes features such as, email, calendar, and todo lists. phpGroupWare 0.9.6 and earlier allow a remote attacker to execute arbitrary commands, caused by a design flaw in the phpgw.inc.php include file. By specifying a malicious include file in the "phpgw_info" parameter of the "phpgw.inc.php" script, a remote attacker could execute arbitrary code on the system with privileges of the Web server.

* Note: This check solely relied on the version number of the remote phpGroupWare to assess this vulnerability, so this might be a false positive.

* References:
http://www.osvdb.org/displayvuln.php?osvdb_id=1682

* Platforms Affected:
Joseph Engo phpGroupWare 0.9.6 and earlier
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of phpGroupWare (0.9.7 or later), available from the phpGroupWare.org Web site at http://sourceforge.net/project/showfiles.php?group_id=7305
Related URL CVE-2001-0043 (CVE)
Related URL 2069 (SecurityFocus)
Related URL 5650 (ISS)