MPM Guestbook Pro top.php Traversal Arbitrary File Access

medium Nessus Plugin ID 16172

Synopsis

The remote web server is hosting a PHP application that is affected by an information disclosure vulnerability.

Description

The remote host is running MPM Guestbook, a guestbook application written in PHP.

There is a flaw in this version which allows an attacker to read arbitrary files on the remote host or to execute arbitrary PHP commands on the remote host by including files hosted on a third-party server.

Solution

There is no known solution at this time.

See Also

http://www.nessus.org/u?430259a2

Plugin Details

Severity: Medium

ID: 16172

File Name: mpm_guestbook_file_reading.nasl

Version: 1.12

Type: remote

Family: CGI abuses

Published: 1/14/2005

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 1/13/2005

Reference Information

BID: 12266