Collaborative Passwords Manager (cPassMan) 'path' Local File Inclusion Vulnerability

Summary
This host is running Collaborative Passwords Manager (cPassMan) and is prone to local file inclusion vulnerability.
Impact
Successful exploitation will allow attacker to obtain potentially sensitive information and to execute arbitrary local scripts in the context of the web server process. Impact Level: Application/System
Solution
upgrade Collaborative Passwords Manager (cPassMan) to 2.0 or later, For updates refer to http://sourceforge.net/projects/communitypasswo/files/
Insight
The flaw is caused by improper validation of user-supplied input via the 'path' parameter to '/sources/downloadfile.php', that allows remote attackers to view files and execute local scripts in the context of the webserver.
Affected
Collaborative Passwords Manager (cPassMan) 1.82 and prior
References