Summary
The host is running CrawlTrack and is prone to unspecified vulnerability.
Impact
Successful exploitation will allow attacker to execute arbitrary PHP code with the privileges of the web server.
Impact Level: Application
Solution
Upgrade to CrawlTrack version 3.2.7 or later,
For updates refer to http://www.crawltrack.net/download.php
Insight
The flaw is caused by input validation errors in the stats pages when processing user-supplied data and parameters, which could allow remote attackers to execute arbitrary PHP code with the privileges of the web server.
Affected
CrawlTrack versions before 3.2.7
References
Severity
Classification
-
CVE CVE-2010-4537 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Afian 'includer.php' Directory Traversal Vulnerability
- Aardvark Topsites <= 4.2.2 Remote File Inclusion Vulnerability
- An Image Gallery Multiple Cross-Site Scripting Vulnerability
- Apache ActiveMQ Persistent Cross-Site Scripting Vulnerability
- Apache Struts CookBook/Examples Multiple Cross-Site Scripting Vulnerabilities