lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <53519cd405032221481608a46d@mail.gmail.com>
Date: Wed, 23 Mar 2005 08:48:50 +0300
From: Aikanáro Calaelen <aikanaro.calaelen@...il.com>
To: Megasky <magasky@...mail.com>
Cc: bugtraq@...urityfocus.com
Subject: Re: osCommerce File Manager Directory Traversal Vulnerability


Well I can't realize about wich version you're talking ! maybe you're
talking about 1.0 ?

On 22 Mar 2005 16:32:05 -0000, Megasky <magasky@...mail.com> wrote:
> 
> 
> there is allready a post on this that have
> file_manager.php?action=download&filename=../../../../../../etc/passwd

So first admin should be password protected, so you'll never access to
those files.
Second safe mode won't let you download any file even if you'r loggued as admin.
 
> sometime the action=download doesn't work , so i tried action=read
> /admin/file_manager.php?action=read&filename=../../../../
> 
> 
This will read the catalog folder, what is vurnerable ?


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ