This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200812-20
(phpCollab: Multiple vulnerabilities)
Multiple vulnerabilities have been found in phpCollab:
rgod reported that data sent to general/sendpassword.php via the
loginForm parameter is not properly sanitized before being used in an
SQL statement (CVE-2006-1495).
Christian Hoffmann of Gentoo
Security discovered multiple vulnerabilities where input is
insufficiently sanitized before being used in a SQL statement, for
instance in general/login.php via the loginForm parameter.
Christian Hoffmann also found out that the
variable $SSL_CLIENT_CERT in general/login.php is not properly
sanitized before being used in a shell command. (CVE-2008-4304).
User-supplied data to installation/setup.php is not checked before
being written to include/settings.php which is executed later. This
issue was reported by Christian Hoffmann as well (CVE-2008-4305).
These vulnerabilities enable remote attackers to execute arbitrary SQL
statements and PHP code. NOTE: Some of the SQL injection
vulnerabilities require the php.ini option 'magic_quotes_gpc' to be
disabled. Furthermore, an attacker might be able to execute arbitrary
shell commands if 'register_globals' is enabled, 'magic_quotes_gpc' is
disabled, the PHP OpenSSL extension is not installed or loaded and the
file 'installation/setup.php' has not been deleted after installation.
There is no known workaround at this time.
See also :
phpCollab has been removed from the Portage tree. We recommend that
users unmerge phpCollab:
# emerge --unmerge 'www-apps/phpcollab'
Risk factor :
Critical / CVSS Base Score : 10.0
Family: Gentoo Local Security Checks
Nessus Plugin ID: 35257 (gentoo_GLSA-200812-20.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now