GuppY 4.5 nwlmail.php lng Parameter Traversal Arbitrary File Access

2005-11-28T00:00:00
ID EDB-ID:26642
Type exploitdb
Reporter retrogod@aliceposta.it
Modified 2005-11-28T00:00:00

Description

GuppY 4.5 nwlmail.php lng Parameter Traversal Arbitrary File Access. CVE-2005-3927. Webapps exploit for php platform

                                        
                                            source: http://www.securityfocus.com/bid/15610/info
   
GuppY is affected by multiple local file include and information disclosure vulnerabilities.
   
An attacker may leverage these issues to execute arbitrary server-side script code that resides on an affected computer with the privileges of the Web server process. This may potentially facilitate unauthorized access.
   
It should be noted that these issues may also be leveraged to read arbitrary files on an affected computer with the privileges of the Web server. An attacker can employ directory traversal sequences and NULL characters to disclose arbitrary files.
   
GuppY 4.5.9 and prior versions are vulnerable. 

http://www.example.com/[path_to_guppy]/admin/inc/nwlmail.php?lng=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fboot.ini%00