[原文]Multiple directory traversal vulnerabilities in AZ Bulletin board (AZbb) before 1.0.08 allow (1) remote authenticated users with administrative privileges to delete arbitrary files via a .. (dot dot) in the URL to admin_avatar.php or admin_attachment.php or (2) remote attackers to enumerate files via a .. (dot dot) in the attachment parameter to attachment.php, which displays a different message when a file exists or does not exist.
MAZ Bulletin board (AZbb) 1.0.08版本中的多个目录遍历漏洞,允许(1)具有管理员权限的远程验证用户通过admin_avatar.php或admin_attachment.php的URL中的..(参数中包含'..')来删除任意文件,或允许(2)远程攻击者通过attachment.php的attachment参数中的..(参数中包含'..')来枚举文件,从而在文件存在或不存在的情况下显示相反的消息。
MAZ Bulletin board (AZbb) 1.0.08版本中的多个目录遍历漏洞,允许(1)具有管理员权限的远程验证用户通过admin_avatar.php或admin_attachment.php的URL中的..(参数中包含'..')来删除任意文件,或允许(2)远程攻击者通过attachment.php的attachment参数中的..(参数中包含'..')来枚举文件,从而在文件存在或不存在的情况下显示相反的消息。
AZ Bulletin Board admin_avatar.php Arbitrary File Deletion
Remote / Network Access
Input Manipulation
Loss of Availability
Upgrade
Exploit Public
Vendor Verified
-
漏洞描述
AZ Bulletin Board contains a flaw that may allow a malicious admin to delete arbitrary files. The issue is triggered when an input validation error occurs in admin_avatar.php. It is possible that the flaw may allow arbitrary file deletion resulting in a loss of availability.
-
时间线
2005-04-19
Unknow
2005-04-19
Unknow
-
解决方案
Upgrade to version 1.0.08 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.