| VID |
21263 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The phptonuke.php script in the PHP-Nuke allows remote attackers to read arbitrary files. myPHPNuke is a freely available PHP-based content management system. The version 1.8.8 of myPHPNuke can disclose unauthorized system files, caused by improper filtering of user-supplied input. To exploit this vulnerability, a remote attacker can send a specially-crafted URL request to the phptonuke.php script to view readable system files as the follow:
http://[targetserver]/phptonuke.php?filnavn=/etc/passwd
It can allow the server to disclose the content of the ' /etc/passwd' file. This information could be used by the attacker to launch further attacks against the affected system.
* References: http://archives.neohapsis.com/archives/bugtraq/2002-10/0225.html
* Platforms Affected: myPHPNuke 1.8.8 |
| Recommendation |
No solution for this vulnerability as of June 2014. |
| Related URL |
CVE-2002-1913 (CVE) |
| Related URL |
5982 (SecurityFocus) |
| Related URL |
10396 (ISS) |
|