Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: CGI abuses --> Category: attack

CuteNews archive Parameter Information Disclosure Vulnerability Vulnerability Scan

Vulnerability Scan Summary
Tries to read a file via archive parameter of CuteNews

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a PHP script that allows reading of
arbitrary files.

Description :

The version of CuteNews installed on the remote host fails to properly
sanitize the 'archive' parameter before using it to read a news file
and return it. An unauthenticated remote attacker may be able to
leverage this issue to read arbitrary files on the remote host subject
to permissions of the web server user id.

Note that successful exploitation of this issue requires that PHP's
'register_globals' setting be enabled.

See also :

Solution :

Unknown at this time.

Threat Level:

Low / CVSS Base Score : 2.3

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.