Local File Inclusion (LFI) in imFAQ Module for ImpressCMS Prior to 1.0.1
imFAQ, a questions and answers management system for ImpressCMS, contains a Local File Inclusion vulnerability in versions prior to 1.0.1. An attacker can manipulate the $_GET['seoOp'] parameter to read sensitive server files by using crafted input like seoOp=php://filter/read=convert.base64-encode/resource=/var/www/html/config.php. The $_GET['seoOp'] and $_GET['seoArg'] parameters are used without proper sanitization or validation. While this vulnerability is partly mitigated by ImpressCMS storing sensitive files outside the web root in a randomized folder, it remains a security risk until version 1.0.1, which resolves the issue.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
impressmodules imfaq |