Family: CGI abuses --> Category: attack
CuteNews archive Parameter Information Disclosure Vulnerability Vulnerability Scan
Vulnerability Scan Summary
Tries to read a file via archive parameter of CuteNews
Detailed Explanation for this Vulnerability Test
The remote web server contains a PHP script that allows reading of
The version of CuteNews installed on the remote host fails to properly
sanitize the 'archive' parameter before using it to read a news file
and return it. An unauthenticated remote attacker may be able to
leverage this issue to read arbitrary files on the remote host subject
to permissions of the web server user id.
Note that successful exploitation of this issue requires that PHP's
'register_globals' setting be enabled.
See also :
Unknown at this time.
Low / CVSS Base Score : 2.3
Click HERE for more information and discussions on this network vulnerability scan.