Synopsis
A web forum on the remote host has a directory traversal vulnerability.
Description
The remote host is running w-agora, a web-based forum application written in PHP.
The remote version of this software is prone to directory traversal attacks. A remote attacker could send specially crafted URL to read arbitrary files from the remote system with the privileges of the web server process.
Solution
Upgrade to the latest version of this software.
Plugin Details
File Name: w_agora_dir_traversal.nasl
Supported Sensors: Nessus
Vulnerability Information
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: No exploit is required
Vulnerability Publication Date: 1/11/2003
Reference Information
BID: 6595