vendor:
SaveWebPortal
by:
SecurityFocus
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: SaveWebPortal
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2004
SaveWebPortal Directory Traversal Vulnerabilities
SaveWebPortal is prone to multiple directory traversal vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. Exploitation of this vulnerability could lead to a loss of confidentiality and integrity. Information obtained may aid in further attacks against the underlying system; other attacks are also possible. An attacker can also execute arbitrary local PHP files through exploitation of this vulnerability. The impact of this will depend on the PHP files available.
Mitigation:
Input validation should be used to prevent directory traversal attacks. All user-supplied input should be validated and filtered for malicious characters.