| GEN:SID | 1:2341 |
| Message | WEB-PHP DCP-Portal remote file include attempt |
| Summary | This event is generated when an attempt is made to exploit a known vulnerability in the PHP web application DCP-Portal.
|
| Impact | Execution of arbitrary code on the affected system
|
| Detailed Information | DCP-Portal contains a flaw such that it may be possible for an attacker to include code of their choosing by manipulating the variable root when making a GET or POST request to a vulnerable system.
It may be possible for an attacker to execute that code with the privileges of the user running the webserver, usually root by supplying their code in a file included from an external source by modifying the variable "root" in the editor.php script.
|
| Affected Systems | DCP-Portal 5.0.1
|
| Attack Scenarios | An attacker can make a request to an affected script and define their own path for the root variable.
|
| Ease of Attack | Simple. No exploit software required.
|
| Corrective Action | Apply the appropriate vendor supplied patches
Upgrade to the latest non-affected version of the software
|
| Additional References | |
| Rule References | bugtraq: 6525
|