Quezza.Class_template.php.Remote.File.Inclusion
Description
This indicates a possible attempt to exploit a Remote File Inclusion vulnerability in Quezza.
The vulnerability is due to insufficient sanitizing of user supplied inputs. A remote attacker can include arbitrary files and execute it within the context of the application.
Affected Products
Quezza 1.0 and earlier
Impact
System Compromise: Remote attackers can gain access of vulnerable systems
Recommended Actions
Currently we are not aware of any vendor supplied patches for this issue.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |