Description
Directory traversal vulnerability in index.php in W-Agora 4.2.0 and earlier allows remote attackers to read arbitrary files via the site parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by matrix_killer · textwebappsphp
https://www.exploit-db.com/exploits/26169
References (7)
Core 7
Core References
Various Sources x_refsource_misc
http://h4cky0u.org/viewtopic.php?t=2097
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/21906
Exploit, Vendor Advisory mailing-list
x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0599.html
Exploit, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/16497
Exploit, Vendor Advisory mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/408522
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/14597
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1014737
Scores
EPSS
0.0978
EPSS Percentile
93.0%
Details
Status
published
Products (1)
w-agora/w-agora
4.2
Published
Aug 23, 2005
Tracked Since
Feb 18, 2026