Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.802402 |
Kategorie: | Web application abuses |
Titel: | LabWiki Multiple Cross-site Scripting (XSS) and Shell Upload Vulnerabilities |
Zusammenfassung: | This host is running LabWiki and is prone to multiple cross-site; scripting and shell upload vulnerabilities. |
Beschreibung: | Summary: This host is running LabWiki and is prone to multiple cross-site scripting and shell upload vulnerabilities. Vulnerability Insight: The flaws are due to an: - Input passed to the 'from' parameter in index.php is not properly sanitised before being returned to the user. - Input passed to the 'page_no' parameter in recentchanges.php is noti properly sanitised before being returned to the user. - Input passed to the 'userfile' POST parameter in edit.php is not properly verified before being used to upload files. Vulnerability Impact: Successful exploitation will allow remote attackers to execute arbitrary HTML and script code in a user's browser session in context of affected website and to upload arbitrary PHP files with '.gif' extension. Affected Software/OS: LabWiki version 1.1 and prior. Solution: Update to version 1.2 or later. CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N |
Copyright | Copyright (C) 2011 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |