SPiD lang.php lang_path Remote File Inclusion

medium Nessus Plugin ID 18671

Synopsis

The remote web server contains a PHP script that is affected by a remote file include issue.

Description

The remote host is running SPiD, a free, PHP-based photo gallery.

The installed version of SPiD allows remote attackers to control the 'lang_path' variable used when including PHP code in the 'lang/lang.php' script. By leveraging this flaw, an attacker may be able to view arbitrary files on the remote host or to execute arbitrary PHP code, possibly taken from third-party hosts.

Solution

Either ensure that PHP's 'magic_quotes_gpc' setting is enabled and that 'allow_url_fopen' and 'register_globals' are disabled or upgrade to SPiD version 1.3.1.

See Also

http://securitytracker.com/alerts/2005/Jul/1014437.html

Plugin Details

Severity: Medium

ID: 18671

File Name: spid_lang_path_file_includes.nasl

Version: 1.17

Type: remote

Family: CGI abuses

Published: 7/11/2005

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 7/9/2005

Reference Information

CVE: CVE-2005-2198

BID: 14208