Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: CGI abuses --> Category: infos

Credit Card Data Disclosure in CitrusDB Vulnerability Scan

Vulnerability Scan Summary
Searches for the existence of IO directory of CitrusDB

Detailed Explanation for this Vulnerability Test

The remote host is running CitrusDB, an open-source customer database
application written in PHP.

CitrusDB uses a textfile to temporarily store credit card information.
This textfile is located in the web tree via a static URL and thus
accessible to third parties. It also isn't deleted after processing
resulting in a big window of opportunity for a possible hacker.

Workaround : Either deny access to the file using access restriction
features of the remote webserver or change CitrusDB to use a file
outside the document root and not accessible via HTTP.

Solution : Update to CitrusDB version 0.3.6 or higher and set the
option '$path_to_ccfile' in the configuration to a path not
accessible via HTTP.

Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.