/home/users/web/b2539/sl.collinar/kd6ojipublic_html/viewpage.php: Trojan.PHP-43 FOUND
/home/users/web/b2539/sl.collinar/kd6ojipublic_html/administration/accountZQ1O.php: PHP.Trojan.Spambot FOUND
/home/users/web/b2539/sl.collinar/kd6ojipublic_html/administration/Jabook.php: LONGDEF.PHP.Backdoor-3.UNOFFICIAL FOUND
/home/users/web/b2539/sl.collinar/kd6ojipublic_html/includes/jquery/colorbox/images/gallery.php: PHP.Trojan.Spambot FOUND
/home/users/web/b2539/sl.collinar/kd6ojipublic_html/includes/jquery/xml.php: EIG.URL.Malware.Redir-2.UNOFFICIAL FOUND
/home/users/web/b2539/sl.collinar/kd6ojipublic_html/includes/jscripts/tiny_mce/plugins/advhr/js/title.php: PHP.Trojan.Spambot FOUND
/home/users/web/b2539/sl.collinar/kd6ojipublic_html/includes/jscripts/tiny_mce/plugins/contextmenu/plugin.php: EIG.URL.Malware.Redir-2.UNOFFICIAL FOUND
/home/users/web/b2539/sl.collinar/kd6ojipublic_html/themes/Fumaeleon/images/colours/red/ajax.php: EIG.URL.Malware.Redir-2.UNOFFICIAL FOUND
/home/users/web/b2539/sl.collinar/kd6ojipublic_html/themes/Stylo/colour/diff.php: PHP.Trojan.Spambot FOUND
/home/users/web/b2539/sl.collinar/kd6ojipublic_html/wp-conf.php: Trojan.PHP-43 FOUND
/home/users/web/b2539/sl.collinar/wp-conf.php: Trojan.PHP-43 FOUND
Quote
Afoster, considering the time you have been here, I am a bit surprised you did not know that.
Quote
Affected versions: PHPFusion 7.02.06, possibly earlier.
Description:
The vulnerability allows malicious people to conduct XSS attacks.
1. The vulnerability is caused due to insufficient input validation in the parameters "news_id", "news_image", "news_image_t1" and "news_image_t2" in the script administration / news.php. This can be exploited to execute arbitrary SQL commands in the application database.
Note: Successful exploitation requires that you must have permission "administer news".
2. The vulnerability is caused due to insufficient input validation in the parameter "article_id" in the script administration / articles.php. This can be exploited to execute arbitrary SQL commands in the application database.
Note: Successful exploitation requires that you must have permission "administer articles".
3. The vulnerability is caused due to insufficient input validation in the parameter "highlight" in the script forum / viewthread.php (when the parameter "thread_id" is a legitimate ID Notes Forum). This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Manufacturer URL: http://www.php-fusion.co.uk/news.php
Solution: The way to eliminate the vulnerability does not exist at present.
Category Forum
Announcements & Security IssuesLabels
None yet
Statistics
41 participants
Notifications
You are not receiving notifications from this thread.
Related Questions