Owl’s Workshop多重远程文件泄露漏洞

Owl’s Workshop多重远程文件泄露漏洞

漏洞ID 1107734 漏洞类型 路径遍历
发布时间 2004-02-18 更新时间 2005-10-20
图片[1]-Owl’s Workshop多重远程文件泄露漏洞-安全小百科CVE编号 CVE-2004-0302
图片[2]-Owl’s Workshop多重远程文件泄露漏洞-安全小百科CNNVD-ID CNNVD-200411-082
漏洞平台 PHP CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/23724
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200411-082
|漏洞详情
OWLS1.0存在目录遍历漏洞。远程攻击者可以借助以下参数中的..(点点)读取任意文件(1)index.php中的file参数,(2)glossary.php中的editfile,或者(3)newmultiplechoice.php中的editfile。
|漏洞EXP
source: http://www.securityfocus.com/bid/9689/info
  
Owl's Workshop is reported prone to multiple remote file-disclosure vulnerabilities because the application fails to validate user-supplied input passed via a URI parameter.
  
Upon successful exploitation of these issues, an attacker may be able to gain access to sensitive system files, potentially facilitating further attacks.

http://www.example.org/owls/workshop/newmultiplechoice.php?edit=1&editfile=../../../../../../../../../../../../../../../etc/passwd
|参考资料

来源:XF
名称:owls-file-retrieval(15249)
链接:http://xforce.iss.net/xforce/xfdb/15249
来源:www.zone-h.org
链接:http://www.zone-h.org/en/advisories/read/id=3973/
来源:BID
名称:9689
链接:http://www.securityfocus.com/bid/9689
来源:BUGTRAQ
名称:20040218ZH2004-08SA(securityadvisory):OWLS1.0Remotearbitraryfiles
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=107712123305706&w;=2

相关推荐: Junkie FTP Client Server Response Download Filename File Corruption Vulnerability

Junkie FTP Client Server Response Download Filename File Corruption Vulnerability 漏洞ID 1097463 漏洞类型 Input Validation Error 发布时间 20…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享