A vulnerability has been identified in Webfwlog, which could be exploited by attackers to gain unauthorized access to arbitrary files on a vulnerable system. This issue is due to an input validation error in the "include/debug.php" script that does not validate the "conffile" parameter before being passed to a "readfile()" call, which could be exploited by malicious users to access and read the contents of arbitrary files.
Vulnerable Products
Vulnerable Software: Webfwlog version 0.92Webfwlog version 0.91