| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20040223175827.32758.qmail@www.securityfocus.com>
Date: 23 Feb 2004 17:58:27 -0000
From: ZetaLabs <zetalabs@...e-h.org>
To: bugtraq@...urityfocus.com
Subject: ZH2004-09SA (security advisory): PhpNewsManager Remote arbitrary
files retrieving
ZH2004-09SA (security advisory): PhpNewsManager Remote arbitrary files retrieving
Discovered: 02 february 2004
Vendor Contacted: 10 february 2004
Published: 23 february 2004
Name: PhpNewsManager
Affected Systems: 1.46
Issue: Remote file retrieving
Author: G00db0y from Zone-h Security Labs - g00db0y@...e-h.org - zetalabs@...e-h.org
Vendor: http://www.skintech.org
Description
***********
Zone-h Security Team has discovered a flaw in PhpNewsManager. There is a vulnerability in the current version of PhpNewsManager that allows an attacker to retrieve arbitrary files from the webserver with its priviledges.
"phpNewsManager is the ultimate news manager for your website. The script is a whole solution for managing websites and supports many features with multi-level user access."
Details
*******
It's possibile for a remote attacker to retrieve any file from a webserver.
For example try this:
http://address/directory/functions.php?clang=../../../../../../../../../../../../etc/passwd
Solution:
*********
The vendor has been contacted and a patch was not yet produced.
G00db0y from Zone-h Security Labs - g00db0y@...e-h.org - zetalabs@...e-h.org
http://www.zone-h.org/en/advisories/read/id=4024/