vendor:
Qwiki
by:
Unknown
5.5
CVSS
MEDIUM
Path Traversal
22
CWE
Product Name: Qwiki
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested:
2005
Path Traversal in Qwiki
The exploit allows an attacker to access sensitive files on the server by manipulating the page parameter in the URL. By appending %00 to the parameter, the attacker can bypass the file extension check and traverse to the root directory. In this specific case, the attacker is trying to access the _config.php file.
Mitigation:
To mitigate this vulnerability, it is recommended to validate and sanitize user input for file paths. Additionally, ensure that the web application runs with the least privileges necessary.