![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.14258 |
Category: | Web application abuses |
Title: | phpMyFAQ action parameter arbitrary file disclosure vulnerability |
Summary: | The remote web server contains a PHP script that permits information;disclosure of local files.;;The version of phpMyFAQ on the remote host contains a flaw that may lead to an unauthorized information;disclosure. The problem is that user input passed to the 'action' parameter is not properly verified before;being used to include files, which could allow a remote attacker to view any accessible file on the system,;resulting in a loss of confidentiality. |
Description: | Summary: The remote web server contains a PHP script that permits information disclosure of local files. The version of phpMyFAQ on the remote host contains a flaw that may lead to an unauthorized information disclosure. The problem is that user input passed to the 'action' parameter is not properly verified before being used to include files, which could allow a remote attacker to view any accessible file on the system, resulting in a loss of confidentiality. Solution: Upgrade to phpMyFAQ 1.3.13 or newer. CVSS Score: 6.4 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2004-2255 BugTraq ID: 10374 http://www.securityfocus.com/bid/10374 http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0906.html http://www.osvdb.org/6300 http://securitytracker.com/id?1010190 http://secunia.com/advisories/11640 XForce ISS Database: phpmyfaq-file-include(16177) https://exchange.xforce.ibmcloud.com/vulnerabilities/16177 |
Copyright | Copyright (C) 2004 David Maciejak |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |