Mapserver for Windows (MS4W) is prone to an unspecified local file-include vulnerability because it fails to sufficiently sanitize user-supplied input.
Credit:
The information has been provided by Mike Arnold .
The original article can be found at: http://www.securityfocus.com/bid/53737
Vulnerable Systems:
* Gateway Geomatics MapServer for Windows 3.0.4
* Gateway Geomatics MapServer for Windows 2.0
Immune Systems:
* Gateway Geomatics MapServer for Windows 3.0.6
An attacker can exploit this vulnerability to view files and execute arbitrary local PHP scripts with the privileges of the affected application.
Vendor Status:
Vendor had issued an update for this vulnerability
Patch Availability:
http://maptools.org/ms4w/index.phtml?page=home.html
CVE Information:
CVE-2012-2950
Disclosure Timeline:
Initial Release: May 30 2012
Please enable JavaScript to view the comments powered by Disqus.
blog comments powered by