lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <201104190822.p3J8MN5t011256@htbridge.ch> Date: Tue, 19 Apr 2011 10:22:23 +0200 (CEST) From: advisory@...ridge.ch To: bugtraq@...urityfocus.com Subject: HTB22933: Multiple Path disclosure in webSPELL Vulnerability ID: HTB22933 Reference: http://www.htbridge.ch/advisory/multiple_path_disclosure_in_webspell.html Product: webSPELL Vendor: http://www.webspell.org/ ( http://www.webspell.org/ ) Vulnerable Version: 4.2.2a Vendor Notification: 05 April 2011 Vulnerability Type: Path disclosure Risk level: Low Credit: High-Tech Bridge SA Security Research Lab ( http://www.htbridge.ch/advisory/ ) Vulnerability Details: A remote user can determine the full path to the web root directory and other potentially sensitive information. The following PoC is available: [code] http://[host]/about.php http://[host]/articles.php http://[host]/awards.php http://[host]/buddys.php [/code]