Vulnerabilities > CVE-2004-1403 - Unspecified vulnerability in SIR Gnuboard
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN sir
nessus
Summary
PHP remote file inclusion vulnerability in index.php in GNUBoard 3.39 and earlier allows remote attackers to execute arbitrary PHP code by modifying the doc parameter to reference a URL on a remote web server that contains the code.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 10 |
Nessus
NASL family | CGI abuses |
NASL id | GNUBOARD_FILE_INCLUDE.NASL |
description | It is possible to make the remote web server read arbitrary files by using the GNUBoard CGI suite which is installed. An attacker may use this flaw to inject arbitrary code in the remote host and gain a shell with the privileges of the web server. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15975 |
published | 2004-12-15 |
reporter | This script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/15975 |
title | SIR GNUBoard Remote File Inclusion |
code |
|
References
- http://marc.info/?l=bugtraq&m=110313585810712&w=2
- http://marc.info/?l=bugtraq&m=110313585810712&w=2
- http://secunia.com/advisories/13479/
- http://secunia.com/advisories/13479/
- http://sir.co.kr/?doc=bbs/gnuboard.php&bo_table=pds&page=1&wr_id=1871
- http://sir.co.kr/?doc=bbs/gnuboard.php&bo_table=pds&page=1&wr_id=1871
- http://www.securityfocus.com/bid/11948
- http://www.securityfocus.com/bid/11948
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18494
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18494