[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201104072036.p37KawaU021405@www5.securityfocus.com>
Date: Thu, 7 Apr 2011 14:36:58 -0600
From: by_argos@...mail.com
To: bugtraq@...urityfocus.com
Subject: Directory Traversal Vulnerability in 1024cms Admin Control Panel
v1.1.0 Beta (Complete-Modules Package)
=============================================================================================================
1024cms Admin Control Panel v1.1.0 Beta (Complete-Modules Package) - Directory Traversal Vulnerability
=============================================================================================================
Software: 1024cms Admin Control Panel v1.1.0 Beta (complete-modules package)
Vendor: http://1024cms.org/
Vuln Type: Directory Traversal
Remote: Yes
Local: No
Discovered by: QSecure and Demetris Papapetrou
Website: http://www.qsecure.com.cy
Discovered: 15/03/2011
Reported: 29/03/2001
Disclosed: 07/04/2011
VULNERABILITY DESCRIPTION:
==========================
The script "/modules/forcedownload/cls_forcedl.php" is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input in the "filename" parameter.
An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid in further attacks.
PoC Exploit:
============
/modules/forcedownload/force_download.php?filename=../../../../../../../etc/passwd
Powered by blists - more mailing lists