lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060120101548.23238.qmail@securityfocus.com> Date: 20 Jan 2006 10:15:48 -0000 From: alex@...ln.com To: bugtraq@...urityfocus.com Subject: [eVuln] RCBlog Directory Traversal & Sensitive Information Disclosure New eVuln Advisory: RCBlog Directory Traversal & Sensitive Information Disclosure http://evuln.com/vulns/42/summary.html --------------------Summary---------------- Software: RCBlog Sowtware's Web Site: http://www.fluffington.com/ Versions: 1.0.3 Critical Level: Dangerous Type: Sensitive Information Disclosure Class: Remote Status: Unpatched Exploit: Available Solution: Not Available Discovered by: Aliaksandr Hartsuyeu (eVuln.com) eVuln ID: EV0042 -----------------Description--------------- 1. Directories data config are not protected by htaccess in default installiation. This can be used to retrieve registered user's information including logins and password's md5 hashes. 2. Directory traversal is possible. Vulnerable script: index.php Variable $_GET[post] isn't properly sanitized. This can be used to open arbitrary files with txt extention. Administrator's login and password is threatened. Administrator has an ability to upload arbitrary files. System access is possible. --------------Exploit---------------------- Available at: http://evuln.com/vulns/42/exploit.html --------------Solution--------------------- No Patch available. --------------Credit----------------------- Discovered by: Aliaksandr Hartsuyeu (eVuln.com)