Xaraya Directory Traversal Arbitrary File/Directory Manipulation
Medium Nessus Network Monitor Plugin ID 3305
SynopsisThe remote host is vulnerable to a directory traversal flaw.
DescriptionThe remote host is running Xaraya, a PHP Web application framework. This version of Xaraya is vulnerable to a directory traversal flaw. An attacker can request and receive a file that is outside of the web directories. Successful exploitation would give the attacker confidential data (such as the user password file or critical configuration files) that would be useful in other types of attacks.
SolutionUpgrade or patch according to vendor recommendations.