| VID |
21410 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The phpGroupWare, according to its version number, has the 'phpgw.inc.php' Command Execution Vulnerability. phpGroupWare, developed by Joseph Engo, is a PHP-based groupware suite that includes features such as, email, calendar, and todo lists. phpGroupWare 0.9.6 and earlier allow a remote attacker to execute arbitrary commands, caused by a design flaw in the phpgw.inc.php include file. By specifying a malicious include file in the "phpgw_info" parameter of the "phpgw.inc.php" script, a remote attacker could execute arbitrary code on the system with privileges of the Web server.
* Note: This check solely relied on the version number of the remote phpGroupWare to assess this vulnerability, so this might be a false positive.
* References: http://www.osvdb.org/displayvuln.php?osvdb_id=1682
* Platforms Affected: Joseph Engo phpGroupWare 0.9.6 and earlier Linux Any version Unix Any version |
| Recommendation |
Upgrade to the latest version of phpGroupWare (0.9.7 or later), available from the phpGroupWare.org Web site at http://sourceforge.net/project/showfiles.php?group_id=7305 |
| Related URL |
CVE-2001-0043 (CVE) |
| Related URL |
2069 (SecurityFocus) |
| Related URL |
5650 (ISS) |
|