Korean
<< Back
VID 21455
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The KorWeblog has a 'viewimg.php' script Directory Traversal Vulnerability.
KorWeblog is a PHP and MySQL weblog for Linux-based operating systems. KorWeblog versions 1.6.2-cvs and earlier could allow a remote attacker to view a list of files within an arbitrary directory, caused by a failure of the application to properly validate user-supplied input in the 'viewing.php' script. By sending a specially-crafted request containing "dot dot" sequences (/../) in the 'path' variable, a remote attacker could view a listing of the contents of a specified server directory located outside of the web root.

* References:
http://securitytracker.com/alerts/2004/Nov/1012312.html

* Platforms Affected:
KorWeblog 1.6.2-cvs and prior
Linux Any version
Recommendation Apply the appropriate patch for this problem available from the KorWeblog Web Site at http://sourceforge.net/projects/eunjea/
Related URL CVE-2004-1543 (CVE)
Related URL 11744 (SecurityFocus)
Related URL 18234 (ISS)