VID |
21868 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The CuteNews is vulnerable to a directory traversal vulnerability via the 'archive' parameter. CutePHP CuteNews is a freely available PHP based news management software that uses flat files to store the database. CuteNews version 1.4.1 and possibly earlier versions are vulnerable to a directory traversal vulnerability in the inc/function.php script. By sending send a specially-crafted HTTP POST or COOKIE request to the inc/function.php script including "dot dot" sequences in the 'archive' parameter, a remote unauthenticated attacker could view arbitrary files outside of the web root directory with the privileges of the Web service.
* References: http://www.hamid.ir/security/cutenews.txt http://secunia.com/advisories/19289/
* Platforms Affected: CutePHP CuteNews version 1.4.1 and possibly earlier versions Any operating system Any version |
Recommendation |
Upgrade to the latest version of CuteNews (1.4.2 or later), available from the CutePHP Web site at http://cutephp.com/cutenews/ |
Related URL |
CVE-2006-1339,CVE-2006-1340 (CVE) |
Related URL |
17152 (SecurityFocus) |
Related URL |
25324 (ISS) |
|