Remote access vulnerability using BigDump ver. 0.29b

2008-11-06 / 2008-11-07
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-94


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

============================================================ !vuln BigDump ver. 0.29b Previous versions may also be affected. ============================================================ ============================================================ !risk Medium There are currently many websites circulating with BigDump enabled. ============================================================ ============================================================ !dork Dork: intitle:"BigDump ver. 0.29b" ============================================================ ============================================================ !discussion A user is able to successfully upload files onto a server by uploading a php shell such as c99.php, by renaming it c99.php.sql ============================================================ ============================================================ !solution Do not use BigDump or put non-root/guest permissions on the folder containing BigDump. The vendor has not yet been notified. ============================================================ ============================================================ !greetz Greetz go out to the people who know me. ============================================================ ============================================================ !author Xia Shing Zee ============================================================

References:

http://xforce.iss.net/xforce/xfdb/46539
http://www.securityfocus.com/bid/32152
http://www.securityfocus.com/archive/1/archive/1/498093/100/0/threaded


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top