This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200412-27
(PHProjekt: Remote code execution vulnerability)
cYon discovered that the authform.inc.php script allows a remote
user to define the global variable $path_pre.
A remote attacker can exploit this vulnerability to force
authform.inc.php to download and execute arbitrary PHP code with the
privileges of the web server user.
There is no known workaround at this time.
See also :
All PHProjekt users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=www-apps/phprojekt-4.2-r2'
Risk factor :
Family: Gentoo Local Security Checks
Nessus Plugin ID: 16075 (gentoo_GLSA-200412-27.nasl)
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.