OneFileCMS 'i' Parameter Directory Traversal Vulnerability
BID:52546
Info
OneFileCMS 'i' Parameter Directory Traversal Vulnerability
| Bugtraq ID: | 52546 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 17 2012 12:00AM |
| Updated: | Mar 17 2012 12:00AM |
| Credit: | mr.pr0n |
| Vulnerable: |
OneFileCMS OneFileCMS 1.1.5 |
| Not Vulnerable: | |
Discussion
OneFileCMS 'i' Parameter Directory Traversal Vulnerability
OneFileCMS is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input.
Remote attackers can use specially crafted requests with directory-traversal sequences ('../') to retrieve arbitrary files in the context of the application.
Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks.
OneFileCMS 1.1.5 is vulnerable; other versions may also be affected.
OneFileCMS is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input.
Remote attackers can use specially crafted requests with directory-traversal sequences ('../') to retrieve arbitrary files in the context of the application.
Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks.
OneFileCMS 1.1.5 is vulnerable; other versions may also be affected.
Exploit / POC
OneFileCMS 'i' Parameter Directory Traversal Vulnerability
An attacker can exploit the issue through a browser
The following example URI is available:
http://wwww.example.com/onefilecms/onefilecms.php?i=../../../../
An attacker can exploit the issue through a browser
The following example URI is available:
http://wwww.example.com/onefilecms/onefilecms.php?i=../../../../
Solution / Fix
OneFileCMS 'i' Parameter Directory Traversal Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
References
OneFileCMS 'i' Parameter Directory Traversal Vulnerability
References:
References:
- OneFileCMS Homepage (OneFileCMS)