phpMyAgenda rootagenda Parameter File Include Vulnerability

high Nessus Plugin ID 21305

Synopsis

The remote web server contains a PHP application that is prone to remote and local file inclusion attacks.

Description

phpMyAgenda is installed on the remote system. It's an open source event management system written in PHP.

The application does not sanitize the 'rootagenda' parameter in some of its files. This may allow an attacker to include arbitrary files, possibly taken from third-party systems, and parse them with privileges of the account under which the web server operates.

Successful exploitation of this issue requires that PHP's 'register_globals' setting be enabled.

Solution

Disable PHP's 'register_globals' setting.

See Also

https://www.securityfocus.com/archive/1/431862/30/0/threaded

Plugin Details

Severity: High

ID: 21305

File Name: phpMyAgenda_30final_file_include.nasl

Version: 1.18

Type: remote

Family: CGI abuses

Published: 5/3/2006

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:phpmyagenda:phpmyagenda

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 4/24/2006

Reference Information

CVE: CVE-2006-2009

BID: 17670