Directory traversal vulnerability in download.php in Mihalism Multi Host 2.0.7 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
Mihalism Multi Host is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data.Exploiting this issue may allow an attacker to access sensitive information that could aid in further attacks.Mihalism Multi Host 2.0.7 is vulnerable; other versions may be affected as well.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: email@example.com.
An attacker can exploit this issue via a browser.The following example URI is available:http://www.example.com//Script/download.php?file=../../../../../../../../../../../etc/passwd