Korean
<< Back
VID 21518
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The paFileDB, according to its version number, has an arbitrary file upload and execution vulnerability. paFileDB is a Web-based file download management program developed by PHP Arena that uses a MySQL database. paFileDB versions 3.1 and earlier can allow a remote attacker to upload malicious files to the server. After a file has been uploaded, it may also be possible for the attacker to execute the file remotely.

* Note: This check solely relied on the version number of the paFileDB program installed on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://archives.neohapsis.com/archives/bugtraq/2005-01/0342.html
http://marc.theaimsgroup.com/?l=bugtraq&m=110720365923818&w=2

* Platforms Affected:
PHP Arena, paFileDB versions 3.1 and earlier
Linux Any version
Microsoft Windows Any version
Unix Any version
Recommendation This problem has been fixed in a second release of paFileDB version 3.1. Please note, the vendor has intentionally not incremented the version number. This was done to prevent attackers from easily identifying unpatched systems. Upgrade to this version of paFileDB, available from the PHP Arena Download Web site at http://www.phparena.net/downloads/pafiledb.php?action=file&id=16

-- OR --

Apply the appropriate patch for your system, available from the PHP Arena Support Web site at http://forums.phparena.net/index.php?act=ST&f=26&t=2170
Related URL (CVE)
Related URL 8271 (SecurityFocus)
Related URL 12717 (ISS)