GTcatalog index.php custom Parameter Remote File Inclusion

critical Nessus Plugin ID 11319

Synopsis

The remote web server contains software that may allow for the execution of arbitrary code.

Description

It is possible to make the remote host include PHP files hosted on a third-party server using GTcatalog.

An attacker may use this flaw to inject arbitrary code in the remote host and gain a shell with the privileges of the web server.

In addition, making a direct request for 'password.inc' may reveal the administrator password, although Nessus has not checked for this.

Solution

Contact the vendor for a patch.

Plugin Details

Severity: Critical

ID: 11319

File Name: GTcatalog_code_injection.nasl

Version: 1.22

Type: remote

Family: CGI abuses

Published: 3/4/2003

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

CVSS Score Rationale: No cve available for this vulnerability.

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 9.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: manual

CVSS v3

Risk Factor: Critical

Base Score: 10

Temporal Score: 9.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:W/RC:X

Vulnerability Information

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Reference Information

BID: 6998