download.aspx in Douran Portal 3.9.7.8 allows remote attackers to obtain source code of arbitrary files under the web root via (1) a trailing ".", (2) a trailing space, or (3) mixed case in the FileNameAttach parameter.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/46927 | vdb entry exploit |
http://www.exploit-db.com/exploits/17011 | exploit |
http://www.securityfocus.com/archive/1/517085/100/0/threaded | mailing list |
http://securityreason.com/securityalert/8180 | third party advisory |
http://soroush.secproject.com/blog/2011/01/unrestricted_file_download_v1_0/ | |
http://osvdb.org/71250 | vdb entry |
http://secunia.com/advisories/43792 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/66177 | vdb entry |