|
Test ID: | 1.3.6.1.4.1.25623.1.0.803116 |
Category: | Web application abuses |
Title: | PRADO PHP Framework 'sr' Parameter Multiple Directory Traversal Vulnerabilities |
Summary: | Check for directory traversal vulnerability in PRADO PHP Framework |
Description: | Description: Overview: This host is running PRADO PHP Framework and is prone to multiple directory traversal vulnerabilities. Vulnerability Insight: Input passed to the 'sr' parameter in 'functional_tests.php' and 'functional.php'is not properly sanitised before being used to get the contents of a resource. Impact: Successful exploitation will allow attackers to perform directory traversal attacks and read arbitrary files on the affected application. Impact Level: Application Affected Software/OS: PRADO PHP Framework version 3.2.0 (r3169) Fix: No solution or patch is available as of 20th November, 2012. Information regarding this issue will be updated once the solution details are available. For updates refer to http://www.pradosoft.com References: http://www.exploit-db.com/exploits/22937/ http://cxsecurity.com/issue/WLB-2012110184 http://packetstormsecurity.org/files/118348/ZSL-2012-5113.txt http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5113.php CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Cross-Ref: |
BugTraq ID: 56677 |
Copyright | Copyright (c) 2012 Greenbone Networks GmbH |
This is only one of 58962 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |
|