This script is Copyright (C) 2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
High-Tech Bridge Security Research Lab reports :
The CSRF vulnerability exists due to insufficient verification of the
HTTP request origin in '/admin.php' script. A remote attacker can
trick a logged-in administrator to visit a specially crafted webpage
and create arbitrary PHP file on the remote server.
The path traversal vulnerability exists due to insufficient filtration
of user-supplied input in 'dl' HTTP GET parameter passed to
'/install.php' script. The script is present on the system after
installation by default, and can be accessed by attacker without any
See also :
Update the affected package.
Risk factor :
High / CVSS Base Score : 7.6