PHProjekt setup.php Authentication Bypass Arbitrary Code Execution

high Nessus Plugin ID 15905

Synopsis

The remote web application can be reconfigured without credentials.

Description

The remote host is running PHProjekt, an open source PHP Groupware package. It runs on most Linux and Unix variants, in addition to Microsoft Windows operating systems.

An unspecified authentication bypass vulnerability is present in the 'setup.php' source file and may be exploited by a remote attacker to gain access to the 'setup.php' file without requiring authentication. The 'setup.php' file may then be employed to make administrative configuration changes to the PHPProjekt website.

Solution

Upgrade setup.php to the fixed version - setup.php,v 1.3.

Plugin Details

Severity: High

ID: 15905

File Name: phpprojekt_auth_bypass.nasl

Version: 1.17

Type: remote

Family: CGI abuses

Published: 12/5/2004

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:phprojekt:phprojekt

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 12/2/2004

Reference Information

CVE: CVE-2004-2739

BID: 11797

CWE: 264