Ultimate PHP Board admin_iplog.php Arbitrary Code Execution

critical Nessus Plugin ID 11671

Language:

Synopsis

The remote host has a PHP script that may allow arbitrary code execution on the remote system.

Description

The remote host is running Ultimate PHP Board (UPB).

There is a flaw in this version which may allow an attacker to execute arbitrary code on this host, by sending a malformed user-agent which contains PHP commands. Once the user-agent has been sent, it is stored in the logs. When the administrator of this website will read the logs through admin_ip.php, the code will be executed.

Solution

Upgrade to the latest version of this CGI.

Plugin Details

Severity: Critical

ID: 11671

File Name: upb_code_injection.nasl

Version: 1.18

Type: remote

Family: CGI abuses

Published: 5/29/2003

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 5/23/2003

Reference Information

CVE: CVE-2003-0395

BID: 7678