WebGlimpse 'DOC' Parameter Directory Traversal Vulnerability
BID:52651
Info
WebGlimpse 'DOC' Parameter Directory Traversal Vulnerability
| Bugtraq ID: | 52651 |
| Class: | Input Validation Error |
| CVE: |
CVE-2009-5114 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 27 2009 12:00AM |
| Updated: | Apr 27 2009 12:00AM |
| Credit: | MustLive |
| Vulnerable: |
WebGlimpse WebGlimpse 2.18.7 |
| Not Vulnerable: | |
Discussion
WebGlimpse 'DOC' Parameter Directory Traversal Vulnerability
WebGlimpse is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input.
Remote attackers can use specially crafted requests with directory-traversal sequences ('../') to retrieve arbitrary files in the context of the application.
Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks.
WebGlimpse 2.18.7 is vulnerable; other versions may also be affected.
WebGlimpse is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input.
Remote attackers can use specially crafted requests with directory-traversal sequences ('../') to retrieve arbitrary files in the context of the application.
Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks.
WebGlimpse 2.18.7 is vulnerable; other versions may also be affected.
Exploit / POC
WebGlimpse 'DOC' Parameter Directory Traversal Vulnerability
An attacker can exploit the issue with a browser.
The following example URI is available:
http://www.example.com/wgarcmin.cgi?NEXTPAGE=D&ID=1&DOC=../../../../etc/passwd
An attacker can exploit the issue with a browser.
The following example URI is available:
http://www.example.com/wgarcmin.cgi?NEXTPAGE=D&ID=1&DOC=../../../../etc/passwd
Solution / Fix
WebGlimpse 'DOC' Parameter Directory Traversal Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
References
WebGlimpse 'DOC' Parameter Directory Traversal Vulnerability
References:
References:
- New vulnerabilities in Webglimpse (MustLive)
- Webglimpse Homepage (Webglimpse)