Korean
<< Back
VID 21697
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Simple PHP Blog is vulnerable to a directory traversal vulnerability in the comments.php script. Simple PHP Blog is a freely available, open source Web blog written in PHP. Simple PHP Blog version 0.3.7c and earlier versions could allow a remote attacker to view files residing outside of the Web root, caused by improper filtering of user-supplied input passed to the 'entry' parameter of the 'comments.php' script. By sending a specially-crafted URL containing "dot dot" sequences (/../), a remote attacker could read arbitrary files outside of the web root directory with the privileges of the Web service.

* References:
http://archives.neohapsis.com/archives/fulldisclosure/2005-01/0210.html

* Platforms Affected:
Alexander Palmo, Simple PHP Blog version 0.3.7c and earlier versions
Any operating system Any version
Recommendation Upgrade to the latest version of Simple PHP Blog (0.3.7r2 or later), available from the Simple PHP Blog Web site at http://www.bigevilbrain.com/sphpblog/static.php?page=static040502-230734
Related URL CVE-2005-0214 (CVE)
Related URL 12193 (SecurityFocus)
Related URL 18802 (ISS)