Synopsis
The remote web server contains a PHP application that is prone to command injection attacks.
Description
The version of XOOPS installed on the remote host fails to filter user-supplied input to the 'mydirname' parameter of the 'onupdate.php', 'notification.php', and 'oninstall.php' scripts under the application's 'xoops_lib/modules/protector' directory before passing it to PHP 'eval()' functions.
Provided PHP's 'register_globals' setting is enabled, an unauthenticated attacker can exploit these issues to execute arbitrary PHP code on the remote host, subject to the privileges of the web server user id.
Solution
Unknown at this time.
Plugin Details
File Name: xoops_mydirname_cmd_exec.nasl
Configuration: Enable thorough checks
Supported Sensors: Nessus
Vulnerability Information
CPE: cpe:/a:xoops:xoops
Required KB Items: www/xoops
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: Exploits are available
Exploited by Nessus: true
Exploitable With
Elliot (XOOPS 2.3.2 RCE)
Reference Information
BID: 33176