Family: CGI abuses --> Category: infos
Credit Card Data Disclosure in CitrusDB Vulnerability Scan
Vulnerability Scan Summary
Searches for the existence of IO directory of CitrusDB
Detailed Explanation for this Vulnerability Test
The remote host is running CitrusDB, an open-source customer database
application written in PHP.
CitrusDB uses a textfile to temporarily store credit card information.
This textfile is located in the web tree via a static URL and thus
accessible to third parties. It also isn't deleted after processing
resulting in a big window of opportunity for a possible hacker.
Workaround : Either deny access to the file using access restriction
features of the remote webserver or change CitrusDB to use a file
outside the document root and not accessible via HTTP.
Solution : Update to CitrusDB version 0.3.6 or higher and set the
option '$path_to_ccfile' in the configuration to a path not
accessible via HTTP.
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.