DCForum Arbitrary File Disclosure Vulnerability
BID:1951
Info
DCForum Arbitrary File Disclosure Vulnerability
| Bugtraq ID: | 1951 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | Yes |
| Published: | Nov 14 2000 12:00AM |
| Updated: | Nov 14 2000 12:00AM |
| Credit: | First reported to bugtraq by "[email protected]" <[email protected]> on Tue, 14 Nov 2000. |
| Vulnerable: |
DC Scripts DCForum 6.0 DC Scripts DCForum 5.0 DC Scripts DCForum 4.0 DC Scripts DCForum 3.0 DC Scripts DCForum 2.0 DC Scripts DCForum 1.0 |
| Not Vulnerable: | |
Discussion
DCForum Arbitrary File Disclosure Vulnerability
DCForum is a commercial cgi script from DCScripts which is designed to facilitate web-based threaded discussion forums.
The script improperly validates user-supplied input, which allows the remote viewing of arbitrary files on the host which are readable by user 'nobody' or the webserver. Additionally, it has been reported that the dcforum.cgi script can be made to delete itself if the attacker attempts to read its source code using this method, effectively permitting a denial-of-service attack.
DCForum is a commercial cgi script from DCScripts which is designed to facilitate web-based threaded discussion forums.
The script improperly validates user-supplied input, which allows the remote viewing of arbitrary files on the host which are readable by user 'nobody' or the webserver. Additionally, it has been reported that the dcforum.cgi script can be made to delete itself if the attacker attempts to read its source code using this method, effectively permitting a denial-of-service attack.
Exploit / POC
DCForum Arbitrary File Disclosure Vulnerability
An exploit has been made available.
An exploit has been made available.
Solution / Fix
DCForum Arbitrary File Disclosure Vulnerability
Solution:
Vendor DCScripts.com patched this vulnerability in the current release shortly after its announcement. Recommend upgrading all previous versions to the fixed 6.0 release.
Solution:
Vendor DCScripts.com patched this vulnerability in the current release shortly after its announcement. Recommend upgrading all previous versions to the fixed 6.0 release.