Description
PHP-Proxy 5.1.0 allows remote attackers to read local files if the default "pre-installed version" (intended for users who lack shell access to their web server) is used. This occurs because the aeb067ca0aa9a3193dce3a7264c90187 app_key value from the default config.php is in place, and this value can be easily used to calculate the authorization data needed for local file inclusion.
Published: 2018-11-13
Score: 7.5 High
EPSS: 47.1% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-pc5h-m95g-v6rh LFI in PHP-Proxy 5.1.0
History

No history.

Subscriptions

Php-proxy Php-proxy
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T11:30:04.042Z

Reserved: 2018-11-13T00:00:00.000Z

Link: CVE-2018-19246

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-11-13T09:29:00.227

Modified: 2024-11-21T03:57:38.290

Link: CVE-2018-19246

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses