Directory traversal vulnerability in importxml.pl in Bugzilla before 2.22.5, and 3.x before 3.0.5, when --attach_path is enabled, allows remote attackers to read arbitrary files via an XML file with a .. (dot dot) in the data element.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2008/2344 | vdb entry |
http://secunia.com/advisories/31444 | third party advisory vendor advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00664.html | vendor advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00687.html | vendor advisory |
http://www.bugzilla.org/security/2.22.4/ | |
http://secunia.com/advisories/34361 | third party advisory |
http://www.securitytracker.com/id?1020668 | vdb entry |
https://bugzilla.mozilla.org/show_bug.cgi?id=437169 | exploit |
http://www.securityfocus.com/bid/30661 | patch vdb entry exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/44407 | vdb entry |