OpenNetAdmin dcm.php options[desc] Parameter Arbitrary Remote PHP Code Execution

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote web server hosts a PHP script that is affected by a remote
PHP code execution vulnerability.

Description :

The remote web server contains OpenNetAdmin, a system used for tracking
IP network attributes in a database. The application utilizes a
web-based interface to administer data as well as a command line
interface.

The version of OpenNetAdmin installed on the remote host is affected by
a remote PHP code execution vulnerability because the 'options[desc]'
parameter of the 'dcm.php' script fails to properly sanitize
user-supplied input. A remote, unauthenticated attacker could leverage
this issue to execute arbitrary PHP code on a remote host by sending a
specially crafted POST request utilizing directory traversal sequences.

Solution :

Currently, there is no known solution to this issue.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 7.1
(CVSS2#E:F/RL:U/RC:ND)
Public Exploit Available : true

Family: CGI abuses

Nessus Plugin ID: 69170 ()

Bugtraq ID: 61004

CVE ID: