EditTag 多个目录遍历漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111942 漏洞类型 输入验证
发布时间 2007-01-05 更新时间 2007-01-11
CVE编号 CVE-2007-0118 CNNVD-ID CNNVD-200701-068
漏洞平台 CGI CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/29393
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200701-068
|漏洞详情
EditTag1.2版本中存在多个目录遍历漏洞。远程攻击者可以借助提交到(1)edittag.cgi,(2)edittag.pl,(3)edittag_mp.cgi或(4)edittag_mp.pl的文件参数中的一个绝对路径名,来读取任意文件。
|漏洞EXP
source: http://www.securityfocus.com/bid/21890/info
   
EditTag is prone to multiple directory-traversal vulnerabilities because the application fails to sufficiently sanitize user-supplied data.
   
Exploiting these issues may allow a remote attacker to access any file on the affected webserver. 
   
Version 1.2 is vulnerable to this issue; other versions may also be affected.

http://www.example.com/edittag/edittag_mp.pl?file=INJECT
|参考资料

来源:BID
名称:21890
链接:http://www.securityfocus.com/bid/21890
来源:BUGTRAQ
名称:20070105MultiplebugsinEditTag
链接:http://www.securityfocus.com/archive/1/archive/1/456055/100/0/threaded
来源:OSVDB
名称:33396
链接:http://osvdb.org/33396
来源:OSVDB
名称:33395
链接:http://osvdb.org/33395
来源:OSVDB
名称:33394
链接:http://osvdb.org/33394
来源:OSVDB
名称:33393
链接:http://osvdb.org/33393
来源:SECUNIA
名称:7950
链接:http://secunia.com/advisories/7950