logo

123 Local file inclusion


Description

The application allows to read or execute files located on the server through relative paths manipulation in the input fields.


Impact

- Visualize the content of sensitive files stored on the server. - Get sensitive data. - Read system files.


Recommendation

- Validate that the parameters received by the application do not contain relative paths. - Disable insecure functions that allow reading of arbitrary files on the server.


Threat

Unauthorized attacker from local network.


Expected Remediation Time

120 minutes.


Score 4.0

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

  • Attack vector: N
  • Attack complexity: L
  • Attack Requirements: N
  • Privileges required: N
  • User interaction: N
  • Confidentiality (VC): H
  • Integrity (VI): N
  • Availability (VA): N
  • Confidentiality (SC): L
  • Integrity (SI): L
  • Availability (SA): L

Threat 4.0

  • Exploit maturity: A

Requirements


Fixes


Last updated

2024/02/13