Multiple directory traversal vulnerabilities in PHP-Fusion before 7.02.06 allow remote authenticated users to include and execute arbitrary files via a .. (dot dot) in the (1) user_theme parameter to maincore.php; or remote authenticated administrators to delete arbitrary files via the (2) enable parameter to administration/user_fields.php or (3) file parameter to administration/db_backup.php.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.waraxe.us/advisory-97.html | exploit |
http://www.openwall.com/lists/oss-security/2013/03/03/2 | mailing list |
http://www.openwall.com/lists/oss-security/2013/03/03/1 | mailing list |
http://www.osvdb.org/90692 | vdb entry |
http://www.osvdb.org/90694 | vdb entry |
http://packetstormsecurity.com/files/120598/PHP-Fusion-7.02.05-XSS-LFI-SQL-Injection.html | exploit |
http://www.php-fusion.co.uk/news.php?readmore=569 | patch vendor advisory |
http://www.osvdb.org/90696 | vdb entry |
http://seclists.org/fulldisclosure/2013/Feb/154 | mailing list |