Torrential 1.2 - 'Getdox.php' Directory Traversal

EDB-ID:

26549


Author:

Shell

Type:

webapps


Platform:

PHP

Date:

2005-11-22


source: https://www.securityfocus.com/bid/15530/info

Torrential is prone to a directory traversal vulnerability. This is due to a lack of proper sanitization of user-supplied input.

An attacker can exploit this issue to retrieve arbitrary remote PHP code on an affected computer with the privileges of the Web server process. This may facilitate unauthorized access.

Torrential Version 1.2 is vulnerable; other versions may also be vulnerable. 

http://www.example.com/torrential/dox/getdox.php/../forums.php
http://www.example.com/torrential/dox/getdox.php/../../index.html