Vulnerabilities > CVE-2005-0380 - Remote File Include vulnerability in Zeroboard DIR Parameter
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Multiple PHP remote file inclusion vulnerabilities in (1) print_category.php, (2) login.php, (3) setup.php, (4) ask_password.php, or (5) error.php in ZeroBoard 4.1pl5 and earlier allow remote attackers to execute arbitrary PHP code by modifying the dir parameter to reference a URL on a remote web server that contains the code.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 |
Nessus
NASL family | CGI abuses |
NASL id | ZEROBOARD_FLAWS2.NASL |
description | The remote host runs Zeroboard, a web BBS application popular in Korea. The remote version of this CGI is vulnerable to multiple flaws which may allow an attacker to execute arbitrary PHP commands on the remote host by including a PHP file hosted on a third-party server, or to read arbitrary files with the privileges of the remote web server. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 16178 |
published | 2005-01-17 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/16178 |
title | ZeroBoard Multiple Scripts dir Parameter Remote File Inclusion |
code |
|
References
- http://marc.info/?l=bugtraq&m=110565373407474&w=2
- http://secunia.com/advisories/13769
- http://securitytracker.com/id?1012884
- http://www.osvdb.org/12928
- http://www.osvdb.org/12929
- http://www.osvdb.org/12930
- http://www.osvdb.org/12931
- http://www.osvdb.org/12932
- http://www.securityfocus.com/bid/12206
- http://www.securityfocus.com/bid/12258
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18892
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18893