[] NeoSense

PHPWebFileManager 2.0 - 'index.php' Directory Traversal

Author: RusH security team
type: webapps
platform: php
port: 
date_added: 2003-11-17 
date_updated: 2012-12-13 
verified: 1 
codes: OSVDB-2829 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/9053/info

It has been reported that phpWebFileManager may be prone to a directory traversal vulnerability that may allow an attacker to gain access to sensitive information. The issue presents itself due to insufficient sanitization of user-supplied input. An attacker may traverse outside the server root directory by using '../' character sequences.

phpWebFileManager version 2.0.0 is reported to be prone to this issue, however other versions may be affected as well.

http://www.example.com/phpwebfilemgr/index.php?f=../../../