WebPagetest 'file' parameter Local File Disclosure Vulnerability

Summary
This host is installed with WebPagetest and is prone to local file disclosure vulnerability.
Impact
Successful exploitation will allow remote attackers to obtain potentially sensitive information from local files which may lead to further attacks. Impact Level: Application
Solution
No Solution or patch is available as of 30th December, 2013. Information regarding this issue will be updated once the solution details are available. For updates refer to http://www.webpagetest.org
Insight
Flaw is due to an improper validation of user supplied input to the 'file' parameter in 'gettext.php', 'gettcpdump.php', and 'getgzip.php' scripts.
Affected
WebPagetest version 2.7 and prior.
Detection
Send a crafted data via HTTP GET request and check whether it is able to read local file or not.
References