header-logo
Suggest Exploit
vendor:
phpTrafficA
by:
SecurityFocus
7.5
CVSS
HIGH
Directory-Traversal
22
CWE
Product Name: phpTrafficA
Affected Version From: 1.4.2001
Affected Version To: 1.4.2001
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

phpTrafficA Multiple Directory-Traversal Vulnerabilities

phpTrafficA is prone to multiple directory-traversal vulnerabilities because the application fails to properly sanitize user-supplied input. An attacker can exploit these vulnerabilities to retrieve arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid the attacker in further attacks.

Mitigation:

Input validation should be used to prevent directory traversal attacks. All user-supplied input should be validated and filtered for malicious characters.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/22655/info

phpTrafficA is prone to multiple directory-traversal vulnerabilities because the application fails to properly sanitize user-supplied input.

An attacker can exploit these vulnerabilities to retrieve arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid the attacker in further attacks.

phpTrafficA version 1.4.1 is vulnerable to these issues. 

http://www.example.com/phpTrafficA/plotStat.php?file=/../../../../../../../../../etc/passwd