Korean
<< Back
VID 21283
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The phpGedView allows remote attackers to read arbitrary files on the server.
The phpGedView is a freely available Web-based program that displays genealogy information. The version 2.65.1 and earlier of phpGedView is vulnerable to a file disclosure vulnerability, caused by improper filtering of user-supplied data via the 'gedcom_config' parameter of the 'editconfig_gedcom.php' script. A remote attacker can read any readable files on the target server via the dot dot(..) sequences in the gedcom_config parameter as the followings:

http://[target]/[phpGedView_Dir]/editconfig_gedcom.php?gedcom_config=../../../../../../../../../../etc/passwd

It is possible for an attacker to gain sensitive information on a system.

* Refernces:
http://www.securityfocus.com/archive/1/352355

* Platforms Affected:
phpGedView version 2.65.1 and prior
Recommendation Upgrade to the fixed version of phpGedView (2.65.2 and later) from phpGedView Web page:
http://phpgedview.sourceforge.net . Now the latest version (phpGedView 2.65.3) is released on 3, Feb. 2004.
Related URL CVE-2004-0127 (CVE)
Related URL 9529 (SecurityFocus)
Related URL (ISS)