Potato News "user" Parameter Handling Local File Inclusion Vulnerability
Description
A vulnerability has been identified in Potato News, which could be exploited by attackers to gain knowledge of sensitive information. This issue is caused by an input validation error in the "admin.php" script when processing the "user" cookie parameter, which could be exploited by attackers to include or disclose the contents of local files with the privileges of the web server.
Vulnerable Products
Vulnerable Software: Potato News version 1.0.0 and prior