FreeBSD : phpmyfaq -- arbitrary PHP code execution vulnerability (3b86583a-66a7-11e3-868f-0025905a4771)

High Nessus Plugin ID 71485


The remote FreeBSD host is missing a security-related update.


The phpMyFAQ team reports :

Secunia noticed while analysing the advisory that authenticated users with 'Right to add attachments' are able to exploit an already publicly known issue in the bundled Ajax File Manager of phpMyFAQ version 2.8.3, which leads to arbitrary PHP code execution for authenticated users with the permission 'Right to add attachments'.


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 71485

File Name: freebsd_pkg_3b86583a66a711e3868f0025905a4771.nasl

Version: $Revision: 1.2 $

Type: local

Published: 2013/12/17

Modified: 2013/12/18

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:phpmyfaq, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2013/12/16

Vulnerability Publication Date: 2013/11/26