Synopsis
The remote web server contains a PHP script that should not be accessible.
Description
The remote host is running pluck, a simple content management system written in PHP.
The installation of pluck on the remote host allows an anonymous remote attacker to call the 'update.php' script, which is intended only for upgrading from one version of pluck to another.
Note that an attacker may be able to use this script to disable the affected application and possibly even execute arbitrary PHP code, although Nessus has not checked for this.
Solution
Remove the 'update.php' script.
Plugin Details
File Name: pluck_update.nasl
Configuration: Enable thorough checks (optional)
Supported Sensors: Nessus
Vulnerability Information
Required KB Items: www/PHP
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: Exploits are available