Frimousse "name" Parameter Handling Arbitrary Data Disclosure Issue
Description
A vulnerability has been identified in Frimousse, which could be exploited by attackers to gain unauthorized read access to arbitrary files and directories. This issue is caused by an input validation error in the "explorerdir.php" script that does not validate the "name" parameter, which could be exploited by malicious people to disclose the contents of arbitrary files and directories on a vulnerable server via directory traversal attacks.
Vulnerable Products
Vulnerable Software: Frimousse version 0.0.2 and prior