Korean
<< Back
VID 21789
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The GuppY program is vulnerable to multiple remote vulnerabilities which exist in versions prior to 4.5.10. GuppY is a CMS (Content Management System) written in PHP that doesn't require any database to run. GuppY versions prior to 4.5.10 are vulnerable to multiple remote vulnerabilities. A remote command execution vulnerability could allow a remote attacker to execute arbitrary commands on the system with privileges of the Web server via the _SERVER[REMOTE_ADDR] parameter to error.php. In addition, multiple directory traversal vulnerabilities could allow a remote attacker to send a specially-crafted URL request including dot-dot-slash (../) character sequences to read arbitrary files outside of the document root with System level privileges via the meskin parameter to admin/editorTypetool.php, lng parameter to admin/inc or archbatch.php or dbbatch.php or nwlmail.php.

* References:
http://rgod.altervista.org/guppy459_xpl.html
http://www.securityfocus.com/archive/1/417899
http://www.frsirt.com/english/advisories/2005/2635
http://securitytracker.com/id?1015279
http://secunia.com/advisories/17790
http://archives.neohapsis.com/archives/bugtraq/2005-11/0324.html

* Platforms Affected:
GuppY versions 4.5.9 and earlier
Any operating system Any version
Recommendation Upgrade to the latest version of GuppY (4.5.10 or later), available from the GuppY Web site at http://www.freeguppy.org/fgy5dn.php?lng=en&tconfig=0
Related URL CVE-2005-3926,CVE-2005-3927 (CVE)
Related URL 15609,15610 (SecurityFocus)
Related URL 23318,23319 (ISS)