Easynews does not adequately validate user input. Attackers may exploit this vulnerability to learn the filesystem path where the script is installed.
Easynews is an open-source CGI script designed to create dynamic news story web pages and listings. Easynews does not properly filter input from an unspecified CGI variable. By setting the value of this variable to a non-number, an attacker can cause the script to crash and display the filesystem path where the script is installed.
An attacker can learn the filesystem path of the Easynews script, which includes the server's web directory.
The CERT/CC is currently unaware of a practical solution to this problem.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Vendor has issued information
__ Sort by: Status Alphabetical
Affected Unknown __ Unaffected
Updated: September 20, 2002
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | | N/A
Thanks to Markus Arndt for reporting this vulnerability.
This document was written by Shawn Van Ittersum.
CVE IDs: | None
Severity Metric:** | 0.86
Date Public: | 2001-12-01
Date First Published: | 2002-09-24
Date Last Updated: | 2002-09-24 17:42 UTC
Document Revision: | 4