| VID |
21455 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The KorWeblog has a 'viewimg.php' script Directory Traversal Vulnerability. KorWeblog is a PHP and MySQL weblog for Linux-based operating systems. KorWeblog versions 1.6.2-cvs and earlier could allow a remote attacker to view a list of files within an arbitrary directory, caused by a failure of the application to properly validate user-supplied input in the 'viewing.php' script. By sending a specially-crafted request containing "dot dot" sequences (/../) in the 'path' variable, a remote attacker could view a listing of the contents of a specified server directory located outside of the web root.
* References: http://securitytracker.com/alerts/2004/Nov/1012312.html
* Platforms Affected: KorWeblog 1.6.2-cvs and prior Linux Any version |
| Recommendation |
Apply the appropriate patch for this problem available from the KorWeblog Web Site at http://sourceforge.net/projects/eunjea/ |
| Related URL |
CVE-2004-1543 (CVE) |
| Related URL |
11744 (SecurityFocus) |
| Related URL |
18234 (ISS) |
|