PHPyabs.Azione.Parameter.File.Inclusion

description-logoDescription

This indicates an attack attempt against a remote command-execution vulnerability in phpYabs.
A vulnerability has been reported in phpYabs that may allow an attacker to execute shell commands on a vulnerable system. This is possible because the user input filters fail to properly sanitize the Aizone parameter value that is passed to "index.php". An attacker may include shell commands by supplying an injection string through the URL.

affected-products-logoAffected Products

PHPyabs 0.1.2

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Upgrade to the latest version, available from the vendor's web site:

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2021-01-11 16.995