Multiple directory traversal vulnerabilities in BarracudaDrive Web Server before 3.8 allow (1) remote attackers to read arbitrary files via certain ..\ (dot dot backslash) sequences in the URL path, or (2) remote authenticated users to delete arbitrary files or create arbitrary directories via a ..\ (dot dot backslash) sequence in the dir parameter to /drive/c/bdusers/USER/.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/484833/100/0/threaded | mailing list |
http://secunia.com/advisories/28032 | third party advisory vendor advisory |
http://aluigi.altervista.org/adv/barradrive-adv.txt | exploit |
http://securityreason.com/securityalert/3434 | third party advisory |
http://www.securityfocus.com/bid/26805 | exploit vdb entry patch |