VID |
21668 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Jaws software is vulnerable to remote file inclusion vulnerability. Jaws is a Framework and Content Management System for building dynamic web sites, written in PHP. Jaws version 0.5.2 and possibly earlier versions are vulnerable to a directory traversal vulnerability, caused by improper validation of user-supplied input in the path parameter in the gadgets/Blog/BlogModel.php script. If the register_globals is enabled, a remote attacker could send a specially-crafted URL request including "/../" (dot dot) sequences in the path parameter of the 'gadgets/Blog/BlogModel.php' script to read arbitrary files outside of the document root directory.
* References: http://www.hardened-php.net/advisory-072005.php http://marc.theaimsgroup.com/?l=bugtraq&m=112067013827970&w=2
* Platforms Affected: Jaws version 0.5.2 and possibly earlier versions Any operating system Any version |
Recommendation |
Upgrade to the latest version of Jaws (0.5.3 or later), available from the Jaws Web site at http://www.jaws.com
As a workaround, ensure the register_globals is set to off. |
Related URL |
CVE-2005-2179 (CVE) |
Related URL |
14158 (SecurityFocus) |
Related URL |
21247 (ISS) |
|