Directory traversal vulnerability in index.php in phpSysInfo 2.5.1 allows remote attackers to determine the existence of arbitrary files via a .. (dot dot) sequence and a trailing null (%00) byte in the lng parameter, which will display a different error message if the file exists.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://securitytracker.com/id?1016440 | broken link third party advisory vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27527 | third party advisory vdb entry |
http://www.vupen.com/english/advisories/2006/2668 | broken link third party advisory vdb entry permissions required |
http://www.osvdb.org/27015 | vdb entry broken link |
http://secunia.com/advisories/20939 | vendor advisory broken link third party advisory |
http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0066.html | broken link mailing list exploit |
http://www.securityfocus.com/bid/18868 | broken link third party advisory vdb entry |
http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0065.html | broken link mailing list exploit |
https://github.com/advisories/GHSA-2wxv-3g4v-p76p | third party advisory |
https://github.com/phpsysinfo/phpsysinfo/issues/368#issuecomment-1380842745 | third party advisory issue tracking |