FreeBSD : phpmyfaq -- arbitrary PHP code execution vulnerability (3b86583a-66a7-11e3-868f-0025905a4771)

high Nessus Plugin ID 71485

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

The phpMyFAQ team reports :

Secunia noticed while analysing the advisory that authenticated users with 'Right to add attachments' are able to exploit an already publicly known issue in the bundled Ajax File Manager of phpMyFAQ version 2.8.3, which leads to arbitrary PHP code execution for authenticated users with the permission 'Right to add attachments'.

Solution

Update the affected package.

See Also

http://en.securitylab.ru/lab/PT-2013-41

https://www.phpmyfaq.de/news/26

http://www.nessus.org/u?8d2be557

Plugin Details

Severity: High

ID: 71485

File Name: freebsd_pkg_3b86583a66a711e3868f0025905a4771.nasl

Version: 1.6

Type: local

Published: 12/17/2013

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:phpmyfaq, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 12/16/2013

Vulnerability Publication Date: 11/26/2013