|
Family: CGI abuses --> Category: attack
CuteNews archive Parameter Information Disclosure Vulnerability Vulnerability Scan
Vulnerability Scan Summary Tries to read a file via archive parameter of CuteNews
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP script that allows reading of
arbitrary files.
Description :
The version of CuteNews installed on the remote host fails to properly
sanitize the 'archive' parameter before using it to read a news file
and return it. An unauthenticated remote attacker may be able to
leverage this issue to read arbitrary files on the remote host subject
to permissions of the web server user id.
Note that successful exploitation of this issue requires that PHP's
'register_globals' setting be enabled.
See also :
http://www.hamid.ir/security/cutenews.txt
Solution :
Unknown at this time.
Threat Level:
Low / CVSS Base Score : 2.3
(AV:R/AC:L/Au:NR/C:N/I:P/A:N/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|