Korean
<< Back
VID 21787
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The GuppY program is vulnerable to multiple remote vulnerabilities in the HTTP Request headers. GuppY is a CMS (Content Management System) written in PHP that doesn't require any database to run. GuppY versions 4.5.3a and earlier are vulnerable to multiple remote vulnerabilities, caused by improper filtering of user supplied input passed to the 'Referer' and 'User-Agent' headers in the 'error.php' script. These can be exploited to inject arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious user data is viewed via the "error.php" script. In addition, it can also be exploited to inject and execute arbitrary PHP code, but requires that "magic_quotes_gpc" has been disabled.

* References:
http://www.frsirt.com/english/advisories/2005/1639
http://secunia.com/advisories/16707/

* Platforms Affected:
GuppY, GuppY versions 4.5.3a and earlier
Any operating system Any version
Recommendation Upgrade to the latest version of GuppY (4.5.4 or later), available from the GuppY Web site at http://www.freeguppy.org/fgy5dn.php?lng=en&tconfig=0
Related URL CVE-2005-2853 (CVE)
Related URL 14753 (SecurityFocus)
Related URL 22134 (ISS)