GuppY pg Parameter Vulnerability

Summary
The remote web server contains a PHP script that is prone to cross-site scripting and possibly directory traversal attacks. Description : The remote host is running GuppY / EasyGuppY, a CMS written in PHP. The version of Guppy / EasyGuppY installed on the remote host fails to sanitize user-supplied input to the 'pg' field in the 'printfaq.php' script. An attacker can exploit this flaw to launch cross-site scripting and possibly directory traversal attacks against the affected application.
Solution
Upgrade to version 4.5.6a or later.
References