LionWiki Remote File Upload Vulnerability
BID:39224
Info
LionWiki Remote File Upload Vulnerability
| Bugtraq ID: | 39224 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 06 2010 12:00AM |
| Updated: | Apr 06 2010 12:00AM |
| Credit: | ayastar |
| Vulnerable: |
Adam Zivner LionWiki 3.0 |
| Not Vulnerable: | |
Discussion
LionWiki Remote File Upload Vulnerability
LionWiki is prone to a remote file-upload vulnerability because it fails to sufficiently sanitize user-supplied input.
Attackers can exploit this issue to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.
LionWiki 3.0 is vulnerable; other versions may also be affected.
LionWiki is prone to a remote file-upload vulnerability because it fails to sufficiently sanitize user-supplied input.
Attackers can exploit this issue to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.
LionWiki 3.0 is vulnerable; other versions may also be affected.
Exploit / POC
LionWiki Remote File Upload Vulnerability
Attackers can use a browser to exploit this issue.
The following example URI is available:
http://www.example.com/path/index.php?action=upload
http://www.example.com/path/?action=upload
Attackers can use a browser to exploit this issue.
The following example URI is available:
http://www.example.com/path/index.php?action=upload
http://www.example.com/path/?action=upload
Solution / Fix
LionWiki Remote File Upload Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].