Executive Summary

Summary
Title PHPCow file inclusion vulnerability
Informations
Name VU#515417 First vendor Publication 2008-11-19
Vendor VU-CERT Last vendor Modification 2008-11-19
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#515417

PHPCow file inclusion vulnerability

Overview

Older versions of PHPCow may contain a file inclusion vulnerability that could allow an attacker to take control of a vulnerable application.

I. Description

PHPCow is a content management system that uses PHP. Older versions of PHP may have contained a file inclusion vulnerability.

II. Impact

A remote attacker may be able to take control of a vulnerable PHPCow application.

III. Solution

Upgrade

The PHPCow suppport team has reported that recent versions of PHPCow addressed this issue. Contact PHPCow for more information about obtaining updated software.

Workarounds for administrators

  • Administrators are encouraged to periodically check their web server log files for indications (such as malformed URLs) that their web applications have been compromised.
  • Web application firewalls and reverse proxy servers may be able to block some known attacks.

Workarounds for users
  • Following the recommendations in the Securing Your Web Browser document will mitigate many attacks that an attacker may launch after taking over a web application.

Systems Affected

VendorStatusDate NotifiedDate Updated
PHPCow, LLCUnknown2008-11-19

References


https://support.phpcow.com/index.php?_m=knowledgebase&_a=printable&kbarticleid=14
http://www.us-cert.gov/reading_room/securing_browser/
http://www.owasp.org/index.php/PHP_Top_5
http://www.g-brain.net/tutorials/local-file-inclusions.txt

Credit

This document was written by Ryan Giobbi.

Other Information

Date Public:2008-11-19
Date First Published:2008-11-19
Date Last Updated:2008-11-19
CERT Advisory: 
CVE-ID(s): 
NVD-ID(s): 
US-CERT Technical Alerts: 
Metric:1.35
Document Revision:20

Original Source

Url : http://www.kb.cert.org/vuls/id/515417

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-94 Failure to Control Generation of Code ('Code Injection')

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Open Source Vulnerability Database (OSVDB)

Id Description
50209 PHPCow Unspecified Arbitrary Remote Code Execution