S-128: AcuraCMS 'stat.php' Vulnerability


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-128: AcuraCMS 'stat.php' Vulnerability
# 1  
Old 01-22-2008
S-128: AcuraCMS 'stat.php' Vulnerability

AuraCMS is prone to a remote vulnerability that lets attackers run arbitrary script code because it fails to properly sanitize user-supplied input. The risk is MEDIUM. Exploiting this issue could allow attackers to upload and execute arbitrary script code in the context of the affected webserver process.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

5 More Discussions You Might Find Interesting

1. Programming

Encrypt and Decrypt file using RIJNDAEL-128

Hi All, Can I use MCRYPT - (RIJNDAEL-128) / CBC mode to encrypt and decrypt a file? I am trying to find some sample C program on internet, which will encrypt and decrypt a file. But was not able to find any thing. Can some help me with the programming. Thanks. (1 Reply)
Discussion started by: Shre
1 Replies

2. Filesystems, Disks and Memory

Inode size 128 & 256(or more)

Can some one tell me what is difference in inode datastructure for 128 byte inode & 256 byte inode? (0 Replies)
Discussion started by: sach253
0 Replies

3. AIX

How to disable encryption below 128 bit in Websphere ?

Hi, Hi I have setup Websphere Portal and Apache server on Solaris. The problem is that clients are allowed to negotiate lower encryption levels and by default the Websphere Apache HTTP server accepts 56-bit keys (your Firefox client requested 256-bit AES below). So How to disable... (0 Replies)
Discussion started by: neel.gurjar
0 Replies

4. Linux

Installation of Linux in 300 MHz with 128 MB ram

Hi I am very new to Linux, but very keen to learn it. I am having a desktop of 300 MHz with 128 MB RAM and 30 GB hard drive with Windows XP. My first question is - Is there any version/flavour of Linux available that can be installed on above system especially Fedora with less compromise... (6 Replies)
Discussion started by: sanjay1979
6 Replies

5. Cybersecurity

128 bit encryption

Hi there,, I am trying to access to one of the sites on the net but am not able to coz it gives an error saying " The page must be viewed with a high-security Web browser"Upgrade your Web browser to the 128-bit version. " I use IE.v6.0 kindly tell me how can i access to... (3 Replies)
Discussion started by: vicious3126
3 Replies
Login or Register to Ask a Question
RATS(1) 						      General Commands Manual							   RATS(1)

NAME
rats - Rough Auditing Tool for Security SYNOPSIS
rats [options] [file]... DESCRIPTION
rats is a rough auditing tool for security developed by Secure Software, Inc. It is a tool for scanning C, Perl, PHP, and Python source code and flagging common security related programming errors such as buffer overflows and TOCTOU (Time Of Check, Time Of Use) race condi- tions. As its name implies, the tool performs only a rough analysis of source code. It will not find every error and will also find things that are not errors. Manual inspection of your code is still necessary, but greatly aided with this tool. When started, RATS will scan each file or each file in the directory specified on the command line and produce a report when scanning is complete. What vulnerabilities are reported in the final report depend on the data contained in the vulnerability database or databases that are used and the warning level in use. For each vulnerability, the list of files and line numbers where it occured is given, followed by a brief description of the vulnerability and suggested action. OPTIONS
-h, --help Displays a brief usage summary and exit. -a <fun> Report any occurence of function 'fun' in the source file(s) -d <filename>, --database <filename>, --db <filename> Specifies a vulnerability database to be loaded. You may have multiple -d options and each database specified will be loaded. -i, --input Causes a list of function calls that were used which accept external input to be produced at the end of the vulnerability report. -l <lang>, --language <language> Force the specified language to be used regardless of filename extension. Currently valid language names are "c", "perl", "php" and "python". -r, --references Causes references to vulnerable function calls that are not being used as calls themselves to be reported. -w <level>, --warning <level> Sets the warning level. Valid levels are 1, 2 or 3. 1 includes only default and high severity. 2 includes medium severity (default). 3 includes low severity vulnerabilities. -x Causes the default vulnerability databases (which are in the installation data directory, /usr/share/rats by default) to not be loaded. -R, --no-recurssion Do not recurse subdirectories when encountered. --xml Output in XML --html Output in HTML --follow-symlinks Follow symlinks and treat them like whatever they are pointing to. If the symlink points to a directory it will be descended into unless -R is specified, if a pointing to a file, it will be treated as a file. AUTHOR
This manual page was orginally written by Adam Lazur <adam@lazur.org>, for the Debian GNU/Linux system (but may be used by others). Modified by Secure Software, Inc. September 17, 2001 RATS(1)