[原文]Multiple directory traversal vulnerabilities in LogiSphere 0.9.9j allow remote attackers to access arbitrary files via (1) .. (dot dot), (2) "..." (triple dot), and (3) "..//" sequences in the URL, (4) "../" sequences in the source parameter to viewsource.jsp, or (5) "..\" (dot dot backslash) sequences in the NS-query-pat parameter to the search URL. URL.
LogiSphere Server viewsource.jsp source Parameter Traversal Arbitrary File Access
Remote / Network Access
Loss of Confidentiality
LogiSphere Server contains a flaw that allows a remote attacker to traverse outside of a restricted path. The issue is due to the 'viewsource.jsp' script not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../) supplied via the 'source' parameter. This directory traversal attack would allow the attacker to read arbitrary files.
Upgrade to version 1.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.