Vulnerabilities > CVE-2005-4424 - Input Validation vulnerability in PHPkit 1.6.02/1.6.03/1.6.1
Attack vector
NETWORK Attack complexity
LOW Privileges required
SINGLE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Directory traversal vulnerability in PHPKIT 1.6.1 R2 and earlier might allow remote authenticated users to execute arbitrary PHP code via a .. (dot dot) in the path parameter and a %00 at the end of the filename, as demonstrated by an avatar filename ending with .png%00.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 |
Nessus
NASL family | CGI abuses |
NASL id | PHPKIT_MULTIPLE_FLAWS.NASL |
description | The remote host is running PHP-Kit, an open source content management system written in PHP. The remote version of this software is vulnerable to multiple remote and local code execution, SQL injection and cross-site scripting flaws. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15784 |
published | 2004-11-22 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/15784 |
title | PHP-Kit <= 1.6.1 RC2 Multiple Vulnerabilities |
References
- http://cert.uni-stuttgart.de/archive/bugtraq/2005/11/msg00110.html
- http://secunia.com/advisories/17479
- http://securityreason.com/securityalert/157
- http://www.hardened-php.net/advisory_212005.80.html
- http://www.osvdb.org/20562
- http://www.securityfocus.com/bid/15354
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23014