Korean
<< Back
VID 21821
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Xaraya program is vulnerable to a directory traversal vulnerability in the index.php script. Xaraya is a Content Management Solutions and applications framework written in PHP. Xaraya version 1.0.0 RC4 and earlier versions are vulnerable to a directory traversal vulnerability, caused by improper validation of user-supplied input passed to the module parameter of the index.php script. By sending a specially-crafted URL to the index.php script containing "dot dot" sequences (/../) in the module parameter, a remote attacker could traverse directories on the Web server to overwrite arbitrary files or create directories on the affected host subject to the permissions of the web server user id.

* References:
http://www.securityfocus.com/archive/1/archive/1/418087/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/418191/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/418209/100/0/threaded
http://www.xaraya.com/index.php/news/551
http://rgod.altervista.org/xaraya1DOS.hmtl
http://www.frsirt.com/english/advisories/2005/2665
http://secunia.com/advisories/17788

* Platforms Affected:
Xaraya Development Group, Xaraya version 1.0.0 RC4 and earlier versions
Any operating system Any version
Recommendation Upgrade to the latest version of Xaraya (1.0.1 or later), available from the Xaraya Web site at http://www.xaraya.com/
Related URL CVE-2005-3929 (CVE)
Related URL 15623 (SecurityFocus)
Related URL 23301 (ISS)