|Category:||Remote file access|
|Title:||Simple PHP Blog dir traversal|
|Summary:||The remote host runs Simple PHP Blog, an open source blog written in PHP,; which allows for retrieval of arbitrary files from the web server.; These issues are due to a failure of the application to properly; sanitize user-supplied input data.|
The remote host runs Simple PHP Blog, an open source blog written in PHP,
which allows for retrieval of arbitrary files from the web server.
These issues are due to a failure of the application to properly
sanitize user-supplied input data.
Upgrade at least to version 0.3.7 r2.
BugTraq ID: 12193|
Common Vulnerability Exposure (CVE) ID: CVE-2005-0214
Bugtraq: 20050107 Simple PHP Blog directory traversal vulnerability (Google Search)
XForce ISS Database: sphp-dotdot-directory-traversal(18802)
|Copyright||Copyright (C) 2005 David Maciejak|
|This is only one of 87302 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.