VID |
21527 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Web server has a CGI file vulnerable to a PHP include vulnerability. The relevant CGI could allow a remote attacker to include malicious PHP files, caused by improper filtering of user-supplied input passed to a specific parameter in the CGI. A remote attacker could send a specially-crafted URL request to the affected CGI that specifies a malicious script from a remote system as a parameter, which would allow the attacker to execute arbitrary code on the vulnerable Web server.
* Platforms Affected: Any HTTP server Any version Any operating system Any version |
Recommendation |
Modify the affected CGI script to perform proper validation of user-supplied input passed to a specific parameter in the CGI. For details, please see the CERT Web site at http://stuff.mit.edu/afs/athena/astaff/reference/cert/Tips/cgi_metacharacters |
Related URL |
(CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|