lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4A25B098.7040604@leidecker.info>
Date: Wed, 03 Jun 2009 00:07:04 +0100
From: Nico Leidecker <nico@...decker.info>
To: bugtraq@...urityfocus.com
Subject: OCS Inventory NG 1.02 - Directory Traversal

OCS Inventory NG - Directory Traversal  (May 30 2009)
_______________________________________________________________________________


* Product

  Open Computer and Software (OCS) Inventory NG
  (http://www.ocsinventory-ng.org)


* Vulnerable Versions

  OCS Inventory NG 1.02 (Unix)


* Vendor Status

  Vendor has been notified and the vulnerability has been fixed in
version 1.02.1.


* Details

  The Open Computer and Software (OCS) Inventory Next Generation (NG)
provides relevant inventory information about system configurations and
software on the network. The server can be managed using a web
interface. It is possible for unauthenticated users to extract arbitrary
files from the hosting system due to inadequate file handling in cvs.php.

  cvs.php:

		} elseif (isset($_GET['log'])){
			if (file_exists($_GET['rep'].$_GET['log'])){
				$tab = file($_GET['rep'].$_GET['log']);
				while(list($cle,$val) = each($tab)) {
		 		  $toBeWritten  .= $val."\r\n";
				}
				$filename=$_GET['log'];
			}
		}


* Impact

  Attackers may be able to read arbitrary files from the hosting system.


* Exploit

  The vulnerability can be exploited by just using a web browser:

	http://example.org/ocsreports/cvs.php?log=/etc/passwd

_______________________________________________________________________________
http://www.leidecker.info/advisories/2009-05-30-ocs_inventory_ng_directory_traversal.shtml
Nico Leidecker - http://www.leidecker.info

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ