Description
PHP-Proxy 5.1.0 allows remote attackers to read local files if the default "pre-installed version" (intended for users who lack shell access to their web server) is used. This occurs because the aeb067ca0aa9a3193dce3a7264c90187 app_key value from the default config.php is in place, and this value can be easily used to calculate the authorization data needed for local file inclusion.
Published: 2018-11-13
Score: 7.5 High
EPSS: 47.1% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-pc5h-m95g-v6rh LFI in PHP-Proxy 5.1.0
History

No history.

Subscriptions

Php-proxy Php-proxy
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T11:30:04.042Z

Reserved: 2018-11-13T00:00:00.000Z

Link: CVE-2018-19246

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-11-13T09:29:00.227

Modified: 2024-11-21T03:57:38.290

Link: CVE-2018-19246

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses