How to Buy
This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200812-20
(phpCollab: Multiple vulnerabilities)
Multiple vulnerabilities have been found in phpCollab:
rgod reported that data sent to general/sendpassword.php via the
loginForm parameter is not properly sanitized before being used in an
SQL statement (CVE-2006-1495).
Christian Hoffmann of Gentoo
Security discovered multiple vulnerabilities where input is
insufficiently sanitized before being used in a SQL statement, for
instance in general/login.php via the loginForm parameter.
Christian Hoffmann also found out that the
variable $SSL_CLIENT_CERT in general/login.php is not properly
sanitized before being used in a shell command. (CVE-2008-4304).
User-supplied data to installation/setup.php is not checked before
being written to include/settings.php which is executed later. This
issue was reported by Christian Hoffmann as well (CVE-2008-4305).
These vulnerabilities enable remote attackers to execute arbitrary SQL
statements and PHP code. NOTE: Some of the SQL injection
vulnerabilities require the php.ini option 'magic_quotes_gpc' to be
disabled. Furthermore, an attacker might be able to execute arbitrary
shell commands if 'register_globals' is enabled, 'magic_quotes_gpc' is
disabled, the PHP OpenSSL extension is not installed or loaded and the
file 'installation/setup.php' has not been deleted after installation.
There is no known workaround at this time.
See also :
phpCollab has been removed from the Portage tree. We recommend that
users unmerge phpCollab:
# emerge --unmerge 'www-apps/phpcollab'
Risk factor :
Critical / CVSS Base Score : 10.0
Family: Gentoo Local Security Checks
Nessus Plugin ID: 35257 (gentoo_GLSA-200812-20.nasl)
CVE ID: CVE-2006-1495CVE-2008-4303CVE-2008-4304CVE-2008-4305
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.