VID |
21821 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Xaraya program is vulnerable to a directory traversal vulnerability in the index.php script. Xaraya is a Content Management Solutions and applications framework written in PHP. Xaraya version 1.0.0 RC4 and earlier versions are vulnerable to a directory traversal vulnerability, caused by improper validation of user-supplied input passed to the module parameter of the index.php script. By sending a specially-crafted URL to the index.php script containing "dot dot" sequences (/../) in the module parameter, a remote attacker could traverse directories on the Web server to overwrite arbitrary files or create directories on the affected host subject to the permissions of the web server user id.
* References: http://www.securityfocus.com/archive/1/archive/1/418087/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/418191/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/418209/100/0/threaded http://www.xaraya.com/index.php/news/551 http://rgod.altervista.org/xaraya1DOS.hmtl http://www.frsirt.com/english/advisories/2005/2665 http://secunia.com/advisories/17788
* Platforms Affected: Xaraya Development Group, Xaraya version 1.0.0 RC4 and earlier versions Any operating system Any version |
Recommendation |
Upgrade to the latest version of Xaraya (1.0.1 or later), available from the Xaraya Web site at http://www.xaraya.com/ |
Related URL |
CVE-2005-3929 (CVE) |
Related URL |
15623 (SecurityFocus) |
Related URL |
23301 (ISS) |
|