Korean
<< Back
VID 21263
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The phptonuke.php script in the PHP-Nuke allows remote attackers to read arbitrary files.
myPHPNuke is a freely available PHP-based content management system. The version 1.8.8 of myPHPNuke can disclose unauthorized system files, caused by improper filtering of user-supplied input. To exploit this vulnerability, a remote attacker can send a specially-crafted URL request to the phptonuke.php script to view readable system files as the follow:

http://[targetserver]/phptonuke.php?filnavn=/etc/passwd

It can allow the server to disclose the content of the ' /etc/passwd' file. This information could be used by the attacker to launch further attacks against the affected system.

* References:
http://archives.neohapsis.com/archives/bugtraq/2002-10/0225.html

* Platforms Affected:
myPHPNuke 1.8.8
Recommendation No solution for this vulnerability as of June 2014.
Related URL CVE-2002-1913 (CVE)
Related URL 5982 (SecurityFocus)
Related URL 10396 (ISS)