VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
VRDA-091208-001
AROUNDMe Remote File Include Vulnerability
http://secunia.com/advisories/37567/

Input passed to the "language_path" parameter in components/core/connect.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local or external resources.




About This Analysis Information
Analysis Information Provider:
JPCERT/CC
First Published:
2009-12-08
Source Information Category:
Other (news, forums, etc.)
Last Updated:
2009-12-08




Affected Product Tags
lapt:/a:barnraiser:aroundme     (AROUNDMe)
 


Vulnerability Analysis Results
[Information Source Reliability] [?]
X Low [?]

Medium [?]
High [?]

[Impact Level] [?]
Low [?]

Low-Medium [?]
Medium-High [?]
X High [?]

[Access Required] [?]
Physical [?]

Local [?]
Non-routed [?]
X Routed [?]

[Authentication] [?]
Privileged [?]

Standard [?]
Limited [?]
X None or Unnecessary [?]

[User Interaction Required] [?]
X Complex [?]

Simple [?]
None [?]

[Technical Difficulty] [?]
High [?]

Medium-High [?]
Low-Medium [?]
Low [?]

[Availability of Remediation] [?]
Official Patch [?]

Official Workaround [?]
Unofficial Patch [?]
X None [?]

[Incident Activity] [?]
None [?]

X Exploit or PoC [?]
Activity Observed [?]

Alternatives




References

Copyright © 2009 JPCERT/CC All Rights Reserved.