Limbo com_fm Component sql.php classes_dir Parameter Remote File Inclusion

medium Nessus Plugin ID 22408

Synopsis

The remote web server contains PHP scripts that allow copying of arbitrary files into the web document directory.

Description

The remote host is running Limbo CMS, a content-management system written in PHP.

The 'com_fm' component of the version of Limbo installed on the remote host allows an unauthenticated, remote attacker to copy arbitrary files, possibly taken from a third-party host, into the web document directory. An unauthenticated attacker may be able to exploit this flaw to read files on the affected host or even set up a PHP shell that would allow execution of arbitrary code, subject to the privileges of the web server user id.

Solution

Unknown at this time.

See Also

https://www.securityfocus.com/archive/1/446142/30/0/threaded

Plugin Details

Severity: Medium

ID: 22408

File Name: limbo_com_fm_php_shell.nasl

Version: 1.16

Type: remote

Family: CGI abuses

Published: 9/17/2006

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Vulnerability Publication Date: 9/13/2006