RunCMS Remote Arbitrary File Upload

medium Nessus Plugin ID 17987

Synopsis

The remote web server contains a PHP application that allows arbitrary file uploads.

Description

The remote host is running RunCMS / E-Xoops, a content management system written in PHP.

According to its banner, the version of this software installed on the remote host may allow a user to upload arbitrary files and potentially run them. This issue arises if avatar uploads are enabled (they are not by default).

Solution

Set 'Allow custom avatar upload' to 'No' in 'Custom avatar settings'.

See Also

https://www.securityfocus.com/archive/1/395097

Plugin Details

Severity: Medium

ID: 17987

File Name: runcms_avatar_upload.nasl

Version: 1.19

Type: remote

Family: CGI abuses

Published: 4/6/2005

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 6

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Information

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 4/6/2005

Reference Information

CVE: CVE-2005-1031

BID: 13027