dotProject < 2.0.2 Multiple Script Remote File Inclusion

high Nessus Network Monitor Plugin ID 3433

Synopsis

The remote web server contains a PHP application that is affected by multiple remote file inclusion vulnerabilities.

Description

The remote host is running dotProject, a web-based, open-source project management application written in PHP. The installed version of dotProject fails to sanitize user input to various parameters and scripts before using it in calls to PHP functions such as 'include', and 'require_once()'. Provided PHP's 'register_globals' setting is enabled, an unauthenticated attacker may be able to leverage these issues to view arbitrary files or to execute arbitrary PHP code on the remote host, subject to the privileges of the web server user ID.

Solution

Upgrade to version 2.0.2 or higher.

See Also

http://www.securityfocus.com/archive/1/424957/30/0/threaded

http://milw0rm.com/exploits/2191

http://www.dotproject.net/vbulletin/showthread.php?t=4462

http://www.securityfocus.com/archive/1/425285/100/0/threaded

http://www.dotproject.net

Plugin Details

Severity: High

ID: 3433

Family: CGI

Published: 2/15/2006

Updated: 3/6/2019

Nessus ID: 20925

Risk Information

VPR

Risk Factor: High

Score: 7.0

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:W/RC:X

Vulnerability Information

CPE: cpe:/a:dotproject:dotproject

Reference Information

CVE: CVE-2006-0754, CVE-2006-0755, CVE-2006-0756, CVE-2006-4234

BID: 16648, 19547