vendor:
Dayfox Blog
by:
Virangar Security Team (hadihadi)
7.5
CVSS
HIGH
Local File Inclusion (LFI)
98
CWE
Product Name: Dayfox Blog
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
Dayfox Blog LOCAL FILE INCLUSION Vulnerability
Dayfox Blog is prone to a local file inclusion vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to include arbitrary local files from the host system, potentially resulting in the disclosure of sensitive information. This vulnerability affects the 'cat' and 'p' parameters of the 'index.php' script, and the 'archive' parameter of the 'archive.php' script.
Mitigation:
Input validation should be used to ensure that user-supplied input is properly sanitized.