RunCMS < 1.3a3 Arbitrary File Upload

high Nessus Network Monitor Plugin ID 3423

Synopsis

The remote host is vulnerable to a file upload flaw.

Description

The remote host is running RunCMS, a web-based messaging system. This version of RunCMS is vulnerable to a remote file upload flaw. Specifically, an attacker can create a malicious .php3 or .php5 script and upload it to the RunCMS server. The attacker can then invoke the script, causing arbitrary code to be run on the RunCMS system.

Solution

Upgrade to version 1.3a3 or higher, when available.

See Also

http://www.runcms.org

Plugin Details

Severity: High

ID: 3423

Family: CGI

Published: 2/10/2006

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.6

Temporal Score: 6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:runcms:runcms

Reference Information

CVE: CVE-2006-0659, CVE-2006-0721, CVE-2006-1793

BID: 16652, 16578