Korean
<< Back
VID 21668
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Jaws software is vulnerable to remote file inclusion vulnerability. Jaws is a Framework and Content Management System for building dynamic web sites, written in PHP. Jaws version 0.5.2 and possibly earlier versions are vulnerable to a directory traversal vulnerability, caused by improper validation of user-supplied input in the path parameter in the gadgets/Blog/BlogModel.php script. If the register_globals is enabled, a remote attacker could send a specially-crafted URL request including "/../" (dot dot) sequences in the path parameter of the 'gadgets/Blog/BlogModel.php' script to read arbitrary files outside of the document root directory.

* References:
http://www.hardened-php.net/advisory-072005.php
http://marc.theaimsgroup.com/?l=bugtraq&m=112067013827970&w=2

* Platforms Affected:
Jaws version 0.5.2 and possibly earlier versions
Any operating system Any version
Recommendation Upgrade to the latest version of Jaws (0.5.3 or later), available from the Jaws Web site at http://www.jaws.com

As a workaround, ensure the register_globals is set to off.
Related URL CVE-2005-2179 (CVE)
Related URL 14158 (SecurityFocus)
Related URL 21247 (ISS)