This script is Copyright (C) 2013 Tenable Network Security, Inc.
The remote web server hosts a PHP script that is affected by a remote
PHP code execution vulnerability.
The remote web server contains OpenNetAdmin, a system used for tracking
IP network attributes in a database. The application utilizes a
web-based interface to administer data as well as a command line
The version of OpenNetAdmin installed on the remote host is affected by
a remote PHP code execution vulnerability because the 'options[desc]'
parameter of the 'dcm.php' script fails to properly sanitize
user-supplied input. A remote, unauthenticated attacker could leverage
this issue to execute arbitrary PHP code on a remote host by sending a
specially crafted POST request utilizing directory traversal sequences.
Currently, there is no known solution to this issue.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 7.1
Public Exploit Available : true
Family: CGI abuses
Nessus Plugin ID: 69170 ()
Bugtraq ID: 61004