Web Wiz Forums Directory traversal

看板Bugtraq作者時間18年前 (2008/01/24 00:48), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
########################## WwW.BugReport.ir =20 ########################################### # # AmnPardaz Security Research Team # # Title: Web Wiz Forums(TM) # Vendor: http://www.webwizguide.com/ # Bug: Directory traversal # Vulnerable Version: 9.07 # Exploit: Available # Fix Available: No! Fast Solution is available. ############################################################################= ####### #################### - Description: #################### Web Wiz Forums bulletin board system is the ideal forum package for =20 your website's community. #################### - Vulnerability: #################### Input passed to the FolderName parameter in "RTE_file_browser.asp" and =20 "file_browser.asp" are not properly sanitised before being used. This =20 can be exploited to list directories, list txt and list zip files =20 through directory traversal attacks. Also, "RTE_file_browser.asp" does not check user's session and an =20 unauthenticated attacker can perform this attack. -POC: http://[WebWiz Forum]/RTE_file_browser.asp?look=3D&sub=3D\.....\\\.....\\\..= ....\\\ #################### - Fast Solution : #################### You can see below lines in "RTE_file_browser.asp" and "file_browser.asp" =09'Stip path tampering for security reasons =09strSubFolderName =3D Replace(strSubFolderName, "../", "", 1, -1, 1) =09strSubFolderName =3D Replace(strSubFolderName, "..\", "", 1, -1, 1) =09strSubFolderName =3D Replace(strSubFolderName, "./", "", 1, -1, 1) =09strSubFolderName =3D Replace(strSubFolderName, ".\", "", 1, -1, 1) Only add this to them: =09strSubFolderName =3D Replace(strSubFolderName, "/", "\", 1, -1, 1) =09strSubFolderName =3D Replace(strSubFolderName, "\\", "\", 1, -1, 1) =09strSubFolderName =3D Replace(strSubFolderName, "..", "", 1, -1, 1) #################### - Credit : #################### Original Advisory: http://www.bugreport.ir/?/29 AmnPardaz Security Research & Penetration Testing Group Contact: admin[4t}bugreport{d0t]ir WwW.BugReport.ir WwW.AmnPardaz.com
文章代碼(AID): #17bs_Z00 (Bugtraq)