| VID |
21868 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The CuteNews is vulnerable to a directory traversal vulnerability via the 'archive' parameter. CutePHP CuteNews is a freely available PHP based news management software that uses flat files to store the database. CuteNews version 1.4.1 and possibly earlier versions are vulnerable to a directory traversal vulnerability in the inc/function.php script. By sending send a specially-crafted HTTP POST or COOKIE request to the inc/function.php script including "dot dot" sequences in the 'archive' parameter, a remote unauthenticated attacker could view arbitrary files outside of the web root directory with the privileges of the Web service.
* References: http://www.hamid.ir/security/cutenews.txt http://secunia.com/advisories/19289/
* Platforms Affected: CutePHP CuteNews version 1.4.1 and possibly earlier versions Any operating system Any version |
| Recommendation |
Upgrade to the latest version of CuteNews (1.4.2 or later), available from the CutePHP Web site at http://cutephp.com/cutenews/ |
| Related URL |
CVE-2006-1339,CVE-2006-1340 (CVE) |
| Related URL |
17152 (SecurityFocus) |
| Related URL |
25324 (ISS) |
|