dotProject < 2.0.2 Multiple Script Remote File Inclusion

High Nessus Network Monitor Plugin ID 3433

Synopsis

The remote web server contains a PHP application that is affected by multiple remote file inclusion vulnerabilities.

Description

The remote host is running dotProject, a web-based, open-source project management application written in PHP. The installed version of dotProject fails to sanitize user input to various parameters and scripts before using it in calls to PHP functions such as 'include', and 'require_once()'. Provided PHP's 'register_globals' setting is enabled, an unauthenticated attacker may be able to leverage these issues to view arbitrary files or to execute arbitrary PHP code on the remote host, subject to the privileges of the web server user ID.

Solution

Upgrade to version 2.0.2 or higher.

See Also

http://www.securityfocus.com/archive/1/424957/30/0/threaded

http://milw0rm.com/exploits/2191

http://www.dotproject.net/vbulletin/showthread.php?t=4462

http://www.securityfocus.com/archive/1/425285/100/0/threaded

http://www.dotproject.net

Plugin Details

Severity: High

ID: 3433

File Name: 3433.prm

Family: CGI

Published: 2006/02/15

Modified: 2016/01/21

Dependencies: 1442

Nessus ID: 20925

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.5

Temporal Score: 6.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:W/RC:ND

CVSSv3

Base Score: 7.3

Temporal Score: 6.9

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:F/RL:W/RC:X

Reference Information

CVE: CVE-2006-4234, CVE-2006-0756, CVE-2006-0754, CVE-2006-0755

BID: 16648, 19547

OSVDB: 23206, 23207, 23208, 23210, 23211, 23212, 23213, 23214, 23215, 23216, 23217, 23218, 23219, 29478