We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A path traversal vulnerability exists in RIPS Scanner version 0.54. The vulnerability allows remote attackers to read arbitrary files on the system with the privileges of the web server by sending crafted HTTP GET requests to the 'windows/code.php' script with a manipulated 'file' parameter. This can lead to disclosure of sensitive information.
Reserved 2025-04-15 | Published 2025-07-16 | Updated 2025-07-16 | Assigner VulnCheckCWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
localh0t
codesec.blogspot.com/...canner-v-054-local-file-include.html
www.exploit-db.com/exploits/18660
raw.githubusercontent.com/.../scanner/http/rips_traversal.rb
rips-scanner.sourceforge.net/
www.vulncheck.com/advisories/rips-scanner-path-traversal
Support options