Directory traversal vulnerability in the modURL function in instance.c in Weborf before 0.12.3 allows remote attackers to read arbitrary files via ..%2f sequences in a URI.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2010/09/17/3 | mailing list |
http://www.osvdb.org/67840 | vdb entry |
http://secunia.com/advisories/41286 | third party advisory vendor advisory |
http://code.google.com/p/weborf/source/detail?r=464 | |
http://www.openwall.com/lists/oss-security/2010/09/17/8 | mailing list |
http://www.exploit-db.com/exploits/14925/ | exploit |
http://galileo.dmi.unict.it/wiki/weborf/doku.php?id=news:released_0.12.3 | patch |