phpGroupWare phpgw.inc.php phpgw_info Parameter Remote File Inclusion

critical Nessus Plugin ID 15711

Synopsis

Arbitrary commands may be run on the remote host.

Description

The version of PhpGroupWare hosted on the remote web server has a vulnerability that may permit remote attackers to execute arbitrary commands through the 'phpgw_info' parameter of the 'phpgw.inc.php' script, resulting in a loss of integrity.

Solution

Update to phpGroupWare version 0.9.7 or later.

See Also

https://www.phpgroupware.org/

Plugin Details

Severity: Critical

ID: 15711

File Name: phpgroupware_remote_cmd.nasl

Version: 1.21

Type: remote

Family: CGI abuses

Published: 11/13/2004

Updated: 6/4/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:phpgroupware:phpgroupware

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 12/6/2000

Reference Information

CVE: CVE-2001-0043

BID: 2069