First published: Sun Oct 09 2011(Updated: )
** DISPUTED ** Directory traversal vulnerability in maincore.php in PHP-Fusion allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the folder_level parameter. NOTE: this issue has been disputed by a reliable third party.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2010-4931 is disputed, with arguments surrounding the potential impact of the directory traversal vulnerability.
To fix CVE-2010-4931, ensure that all user inputs are properly sanitized and implement access controls to prevent unauthorized file inclusion.
CVE-2010-4931 affects PHP-Fusion versions, allowing remote attackers to exploit the vulnerability through directory traversal.
The exploit for CVE-2010-4931 involves using a .. (dot dot) in the folder_level parameter to include arbitrary local files.
As of the latest information, there is no confirmed active exploitation of CVE-2010-4931, but it remains a potential risk.