发布时间 :2005-05-02 00:00:00
修订时间 :2017-07-10 21:32:31

[原文]Directory traversal vulnerability in the readFile and writeFile API for Maxthon 1.2.0 and 1.2.1 allows remote attackers to read or write arbitrary files.

[CNNVD]Maxthon Web Browser目录遍历漏洞(CNNVD-200505-226)

        Maxthon 1.2.0和1.2.1的readFile和writeFile API中存在目录遍历漏洞,允许远程攻击者读写任意文件。

- CVSS (基础分值)

CVSS分值: 6.4 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BID  13074
(UNKNOWN)  XF  maxthon-directory-traversal(20033)

- 漏洞信息

Maxthon Web Browser目录遍历漏洞
中危 路径遍历
2005-05-02 00:00:00 2005-10-20 00:00:00
        Maxthon 1.2.0和1.2.1的readFile和writeFile API中存在目录遍历漏洞,允许远程攻击者读写任意文件。

- 公告与补丁


- 漏洞信息

Maxthon Browser Plug-in readFile / writeFile Traversal Arbitrary File Manipulation
Remote / Network Access Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

Maxthon Browser contains a flaw that allows a remote attacker to read and write from/to files outside of the plug-in's directory. The issue is due to the readFile() and writeFile() API functions not properly sanitizing user input, specifically traversal style attacks (../../), resulting in a loss of confidentiality and integrity.

- 时间线

2005-04-08 2005-03-27
2005-04-08 Unknow

- 解决方案

Upgrade to version 1.2.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Maxthon Web Browser Plug-in API Directory Traversal Vulnerability
Input Validation Error 13074
Yes No
2005-04-08 12:00:00 2009-07-12 12:56:00
Discovery of this issue is credited to "Aviv Raff" <>.

- 受影响的程序版本

Maxthon Maxthon 1.2.1
Maxthon Maxthon 1.2

- 漏洞讨论

It is reported that the Maxthon Web browser Plug-ins employ 'readFile()' and 'writeFile()' API calls to access files in the Plug-in installation directory. However, reports indicate that it is possible to invoke these API calls to read and write arbitrary files by supplying directory traversal sequences in the path to a target file.

A remote attacker may exploit this issue to read and write files on a target computer with the privileges of a user that is running the vulnerable Web browser.

- 漏洞利用

A proof of concept is available at the following location:

- 解决方案

It is reported that this vulnerability is addressed in Maxthon version 1.2.2. This is not confirmed. Customers are advised to contact the vendor for further information in regards to obtaining and applying an appropriate fix.

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 相关参考