VID |
21787 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The GuppY program is vulnerable to multiple remote vulnerabilities in the HTTP Request headers. GuppY is a CMS (Content Management System) written in PHP that doesn't require any database to run. GuppY versions 4.5.3a and earlier are vulnerable to multiple remote vulnerabilities, caused by improper filtering of user supplied input passed to the 'Referer' and 'User-Agent' headers in the 'error.php' script. These can be exploited to inject arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious user data is viewed via the "error.php" script. In addition, it can also be exploited to inject and execute arbitrary PHP code, but requires that "magic_quotes_gpc" has been disabled.
* References: http://www.frsirt.com/english/advisories/2005/1639 http://secunia.com/advisories/16707/
* Platforms Affected: GuppY, GuppY versions 4.5.3a and earlier Any operating system Any version |
Recommendation |
Upgrade to the latest version of GuppY (4.5.4 or later), available from the GuppY Web site at http://www.freeguppy.org/fgy5dn.php?lng=en&tconfig=0 |
Related URL |
CVE-2005-2853 (CVE) |
Related URL |
14753 (SecurityFocus) |
Related URL |
22134 (ISS) |
|