|Category:||Web application abuses|
|Title:||PRADO PHP Framework 'sr' Parameter Multiple Directory Traversal Vulnerabilities|
|Summary:||Check for directory traversal vulnerability in PRADO PHP Framework|
This host is running PRADO PHP Framework and is prone to multiple directory
Input passed to the 'sr' parameter in 'functional_tests.php' and
'functional.php'is not properly sanitised before being used to get the
contents of a resource.
Successful exploitation will allow attackers to perform directory traversal
attacks and read arbitrary files on the affected application.
Impact Level: Application
PRADO PHP Framework version 3.2.0 (r3169)
Fix: No solution or patch is available as of 20th November, 2012. Information
regarding this issue will be updated once the solution details are available.
For updates refer to http://www.pradosoft.com
BugTraq ID: 56677|
|Copyright||Copyright (c) 2012 Greenbone Networks GmbH|
|This is only one of 39644 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.