J-Security Center

Title: AppServ Open Project Remote File Include Vulnerability

Severity: HIGH


AppServ Open Project is an installation utility that ships with an application suite made up of open source software designed to facilitate the creation of web-based applications that require dynamic content generation and an underlying database. It includes and installs phpMyAdmin for database configuration, Perl, PHP, MySQL, Apache Web Server, as well as other applications.

AppServ Open Project is prone to a remote file include vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

The 'appserv_root' parameter of the 'main.php' script is not properly sanitized, allowing attackers to specify remotely-hosted script files to be executed in the context of the Web server hosting the vulnerable software.

An attacker can exploit this issue to execute arbitrary remote PHP code on an affected computer with the privileges of the Web server process. This may facilitate unauthorized access.

This issue affects version 2.4.5; other versions may also be vulnerable.

Affected Products:

  • AppServ Open Project 2.4.5


Juniper Networks provides this content via a wide variety of sources and production methods. If notified of errors or omissions in the content of this page, Juniper Networks, at its discretion, will modify or remove the page or leave the content as is, depending on various factors including but not limited to the reputation and authority of the party providing the notification. Please use the contact information displayed elsewhere on this page to report any errors or omissions regarding the content on this page.