Directory traversal vulnerability in ecrire/exec/valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to enumerate the files on the system via the var_url parameter in a valider_xml action.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/93451 | third party advisory vdb entry |
https://core.spip.net/projects/spip/repository/revisions/23200 | patch vendor advisory issue tracking |
http://www.openwall.com/lists/oss-security/2016/10/06/6 | patch mailing list third party advisory |
http://www.openwall.com/lists/oss-security/2016/10/05/17 | third party advisory mailing list |
https://sysdream.com/news/lab/2016-10-19-spip-3-1-1-3-1-2-file-enumeration-path-traversal-cve-2016-7982/ | |
http://www.openwall.com/lists/oss-security/2016/10/12/8 | third party advisory mailing list |