Intrusion Prevention

Aardvark.Topsites.PHP.Remote.Command.Execution

Description

It indicates a possible exploit of a PHP remote file inclusion vulnerability in Aardvark Topsites PHP.
This flaw is due to an input validation error in the "sources/lostpw.php" script that does not validate the "CONFIG[path]" parameter.

Affected Products

Aardvark Topsites PHP Aardvark Topsites PHP 4.2.2
Aardvark Topsites PHP Aardvark Topsites PHP 4.1.1
Aardvark Topsites PHP Aardvark Topsites PHP 4.1

Impact

The execution of arbitrary PHP code on the system.

Recommended Actions

Upgrade to Aardvark Topsites PHP version 5.0.2 :
http://www.aardvarktopsitesphp.com/index.php?page=downloads

CVE References

CVE-2006-2149 CVE-2006-7026