Absolute path traversal vulnerability in convert.cgi in Quirex 2.0.2 and earlier allows remote attackers to read arbitrary files, and possibly execute arbitrary code, via the (1) quiz_head, (2) quiz_foot, and (3) template variables.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/426188/100/0/threaded | mailing list |
http://evuln.com/vulns/78/summary.html | vendor advisory |
http://www.securityfocus.com/bid/16709 | vdb entry |
http://www.vupen.com/english/advisories/2006/0641 | vdb entry vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24672 | vdb entry |
http://secunia.com/advisories/18926 | third party advisory vendor advisory |