VID |
21751 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The w-Agora program, according to its version number, has multiple input validation vulnerabilities. w-Agora is a freely available Web forum and publishing program for Microsoft Windows, Linux, and Unix-based operating systems written by PHP. w-Agora version 4.2.0 and possibly earlier versions are vulnerable to multiple input validation vulnerabilities, which can be exploited by a remote attacker to disclose sensitive information and compromise a vulnerable system.
1) Input passed to the "site" parameter in the "extras/quicklist.php" script isn't properly verified, before it is used to include files. This can be exploited to include arbitrary files from local resources. 2) The problem is that arbitrary files can be uploaded to a location inside the web root via the "browse_avatar.php" and "insert.php" scripts. This can be exploited to upload and execute a malicious PHP script.
* Note: This check solely relied on the version number of w-Agora installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://secunia.com/advisories/17201/
* Platforms Affected: Marc Druilhe, w-Agora version 4.2.0 and possibly earlier versions Any operating system Any version |
Recommendation |
No upgrade or patch available as of October 2005.
Upgrade to a version of w-Agora greater than 4.2.0, when new fixed version becomes available from the w-Agora Web site at http://www.w-agora.net/en/download.php |
Related URL |
(CVE) |
Related URL |
15110 (SecurityFocus) |
Related URL |
22744,22746 (ISS) |
|