Multiple directory traversal vulnerabilities in NOCC Webmail 1.0 allow remote attackers to include arbitrary files via .. (dot dot) sequences and a trailing NULL (%00) byte in (1) the _SESSION['nocc_theme'] parameter in (a) html/footer.php; and (2) the lang and (3) theme parameters and the (4) Accept-Language HTTP header field, when force_default_lang is disabled, in (b) index.php, as demonstrated by injecting PHP code into a profile and accessing it using the lang parameter in index.php.
Link | Tags |
---|---|
http://securitytracker.com/id?1015671 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24934 | vdb entry |
http://www.osvdb.org/23416 | vdb entry |
http://archives.neohapsis.com/archives/bugtraq/2006-02/0418.html | mailing list exploit |
http://www.osvdb.org/23417 | vdb entry |
http://secunia.com/advisories/16921 | third party advisory vendor advisory |
http://retrogod.altervista.org/noccw_10_incl_xpl.html | |
http://www.securityfocus.com/bid/16793 | vdb entry |
http://www.osvdb.org/23418 | vdb entry |
http://www.osvdb.org/23419 | vdb entry |