Seo Panel - 'file' Directory Traversal

Author: Eric Sesterhenn
type: webapps
platform: php
port: 
date_added: 2014-05-15  
date_updated: 2016-01-10  
verified: 1  
codes: OSVDB-107696  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 39210.txt  
source: https://www.securityfocus.com/bid/67911/info

Seo Panel is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.

Remote attackers can use a specially crafted request with directory-traversal sequences ('../') to retrieve arbitrary files in the context of the application. Information obtained could aid in further attacks.

Seo Panel 3.4.0 is vulnerable; other versions may also be affected.

http://www.example.com/seopanel/download.php?file=/etc/purple/prefs.xml