Family: Misc. --> Category: infos
QuiXplorer Directory Traversal Vulnerability Scan
Vulnerability Scan Summary
Tests for the QuiXplorer Directory traversal
Detailed Explanation for this Vulnerability Test
The remote host is running the QuiXplorer CGI suite, a file manager
for websites written in PHP.
There is a floaw in the remote version of this CGI which makes it vulnerable
to a directory traversal bug.
This could, for instance, lead to a possible hacker downloading the /etc/passwd file.
Solution : Upgrade to version 2.3.1 - http://quixplorer.sourceforge.net/
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.