|
Family: CGI abuses --> Category: attack
myPHPNuke phptonuke.php Directory Traversal Vulnerability Scan
Vulnerability Scan Summary Reads file through phptonuke.php
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP script that allows for reading of
arbitrary files.
Description :
The version of myPHPNuke installed on the remote host allows anyone to
read arbitrary files by passing the full filename to the 'filnavn'
argument of the 'phptonuke.php' script.
See also :
http://marc.theaimsgroup.com/?l=bugtraq&m=103480589031537&w=2
Solution :
Upgrade to the latest version.
Threat Level:
Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|