[原文]Directory traversal vulnerability in viewimg.php in KorWeblog 1.6.2-cvs and earlier allows remote attackers to list arbitrary directories via a .. (dot dot) in the path parameter.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
source: http://www.securityfocus.com/bid/11744/info
A vulnerability is reported in the KorWeblog software that may allow a remote user to disclose directory listings.
The problem presents itself when a malicious user crafts an URI request containing directory traversal sequences. When properly formatted, the request will present the malicious user with a listing of the contents of a specified server directory located outside of the web root.
An attacker may leverage this issue to gain access to sensitive information by disclosing directory listings; information disclosed in this way could lead to further attacks against the target system.
http://www.example.com/viewimg.php?path=images.d/face/../../../../../../../&form=Co
m&var=faceicon
Discovery of this vulnerability is credited to Jeremy Bae of STG Security.
-
受影响的程序版本
KorWeblog KorWeblog 1.6.2-cvs
-
漏洞讨论
A vulnerability is reported in the KorWeblog software that may allow a remote user to disclose directory listings.
The problem presents itself when a malicious user crafts an URI request containing directory traversal sequences. When properly formatted, the request will present the malicious user with a listing of the contents of a specified server directory located outside of the web root.
An attacker may leverage this issue to gain access to sensitive information by disclosing directory listings; information disclosed in this way could lead to further attacks against the target system.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.