Serendipity serendipity[charset] Parameter Local File Inclusion

medium Nessus Network Monitor Plugin ID 3835

Synopsis

The remote web server contains a PHP application that is affected by multiple local file inclusion issues.

Description

Several scripts included with the version of Serendipity installed on the remote host fail to sanitize input to the 'serendipity[charset]' parameter before using it to include PHP code. Provided PHP's 'register_globals' setting is enabled, an unauthenticated attacker may be able to exploit these issues to view arbitrary files or to execute arbitrary PHP code on the remote host, subject to the privileges of the web server user IS.

Solution

No solution is known at this time.

See Also

http://milw0rm.com/exploits/2869

Plugin Details

Severity: Medium

ID: 3835

Family: CGI

Published: 12/1/2006

Updated: 3/6/2019

Nessus ID: 23752

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.8

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 6.3

Temporal Score: 5.9

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:s9y:serendipity

Reference Information

CVE: CVE-2006-1910, CVE-2006-6242

BID: 17566, 21367