Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.14258
Category:Web application abuses
Title:phpMyFAQ action parameter arbitrary file disclosure vulnerability
Summary:The remote web server contains a PHP script that permits information;disclosure of local files.;;The version of phpMyFAQ on the remote host contains a flaw that may lead to an unauthorized information;disclosure. The problem is that user input passed to the 'action' parameter is not properly verified before;being used to include files, which could allow a remote attacker to view any accessible file on the system,;resulting in a loss of confidentiality.
Description:Summary:
The remote web server contains a PHP script that permits information
disclosure of local files.

The version of phpMyFAQ on the remote host contains a flaw that may lead to an unauthorized information
disclosure. The problem is that user input passed to the 'action' parameter is not properly verified before
being used to include files, which could allow a remote attacker to view any accessible file on the system,
resulting in a loss of confidentiality.

Solution:
Upgrade to phpMyFAQ 1.3.13 or newer.

CVSS Score:
6.4

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-2255
BugTraq ID: 10374
http://www.securityfocus.com/bid/10374
http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0906.html
http://www.osvdb.org/6300
http://securitytracker.com/id?1010190
http://secunia.com/advisories/11640
XForce ISS Database: phpmyfaq-file-include(16177)
https://exchange.xforce.ibmcloud.com/vulnerabilities/16177
CopyrightCopyright (C) 2004 David Maciejak

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.