Korean
<< Back
VID 21751
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The w-Agora program, according to its version number, has multiple input validation vulnerabilities. w-Agora is a freely available Web forum and publishing program for Microsoft Windows, Linux, and Unix-based operating systems written by PHP. w-Agora version 4.2.0 and possibly earlier versions are vulnerable to multiple input validation vulnerabilities, which can be exploited by a remote attacker to disclose sensitive information and compromise a vulnerable system.

1) Input passed to the "site" parameter in the "extras/quicklist.php" script isn't properly verified, before it is used to include files. This can be exploited to include arbitrary files from local resources.
2) The problem is that arbitrary files can be uploaded to a location inside the web root via the "browse_avatar.php" and "insert.php" scripts. This can be exploited to upload and execute a malicious PHP script.

* Note: This check solely relied on the version number of w-Agora installed on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://secunia.com/advisories/17201/

* Platforms Affected:
Marc Druilhe, w-Agora version 4.2.0 and possibly earlier versions
Any operating system Any version
Recommendation No upgrade or patch available as of October 2005.

Upgrade to a version of w-Agora greater than 4.2.0, when new fixed version becomes available from the w-Agora Web site at http://www.w-agora.net/en/download.php
Related URL (CVE)
Related URL 15110 (SecurityFocus)
Related URL 22744,22746 (ISS)