OpenNetAdmin dcm.php options[desc] Parameter Arbitrary Remote PHP Code Execution

This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.

Synopsis :

The remote web server hosts a PHP script that is affected by a remote
PHP code execution vulnerability.

Description :

The remote web server contains OpenNetAdmin, a system used for tracking
IP network attributes in a database. The application utilizes a
web-based interface to administer data as well as a command line

The version of OpenNetAdmin installed on the remote host is affected by
a remote PHP code execution vulnerability because the 'options[desc]'
parameter of the 'dcm.php' script fails to properly sanitize
user-supplied input. A remote, unauthenticated attacker could leverage
this issue to execute arbitrary PHP code on a remote host by sending a
specially crafted POST request utilizing directory traversal sequences.

Solution :

Currently, there is no known solution to this issue.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 7.1
Public Exploit Available : true

Family: CGI abuses

Nessus Plugin ID: 69170 ()

Bugtraq ID: 61004


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now