Discuz File Extension Validation Weakness Arbitrary File Upload

medium Nessus Network Monitor Plugin ID 3167

Synopsis

The remote host is vulnerable to a script injection attack.

Description

The remote host is running Discuz, a web-based message board. This version of Discuz is vulnerable to a flaw that would allow remote attackers to upload arbitrary files to the web server. The attacker could then execute the uploaded file (with the permission of the web server) or convince other Discuz users to download and/or execute the code. An attacker exploiting this flaw would be able to gain access to confidential data, potentially impact the availability of the server, and tarnish the integrity of the server.

Solution

No solution is known at this time.

Plugin Details

Severity: Medium

ID: 3167

Family: CGI

Published: 8/17/2005

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 6.3

Temporal Score: 5.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:crosscom_olicom:discuz

Reference Information

CVE: CVE-2005-2614

BID: 14564