Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jwm7-gvgf-58g7

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

download.php in FD Script 1.3.2 and earlier allows remote attackers to read source of files under the web document root with certain extensions, including .php, via a relative pathname in the fname parameter, as demonstrated by downloading config.php.

download.php in FD Script 1.3.2 and earlier allows remote attackers to read source of files under the web document root with certain extensions, including .php, via a relative pathname in the fname parameter, as demonstrated by downloading config.php.

EPSS

Процентиль: 94%
0.13922
Средний

Связанные уязвимости

nvd
около 19 лет назад

download.php in FD Script 1.3.2 and earlier allows remote attackers to read source of files under the web document root with certain extensions, including .php, via a relative pathname in the fname parameter, as demonstrated by downloading config.php.

EPSS

Процентиль: 94%
0.13922
Средний