EasyWeb is prone to a directory traversal vulnerability. This issue presents itself due to insufficient sanitization of user-supplied data. The issue occurs if a remote attacker sends a request to the 'ew_filemanager' script for a file containing directory traversal character sequences to the application.
EasyWeb FileManager 1.0 RC-1 is prone to this issue.
Update: Conflicting reports suggest that this issue may not be a vulnerability as access to various files can be limited by an EasyWeb administrator. An attacker with valid account credentials may only be able to carry out an attack. This BID will be updated as more information becomes available.
EasyWeb FileManager contains a flaw that allows a remote attacker to access arbitrary files or directory listings outside of the web path. The issue is due to the module not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the "pathext" variable. These activities require a valid administrator login, diminishing the severity of the attack.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.