PHP Advanced Transfer Manager (phpATM) html.php current_dir Variable Traversal Arbitrary File Access

2005-09-20T10:05:00
ID OSVDB:19525
Type osvdb
Reporter rgod(retrogod@aliceposta.it)
Modified 2005-09-20T10:05:00

Description

Vulnerability Description

PHP Advanced Transfer Manager contains a flaw that allows a remote attacker to access arbitrary files outside of the web path. The issue is due to the html.php script not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the 'current_dir' variable.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

PHP Advanced Transfer Manager contains a flaw that allows a remote attacker to access arbitrary files outside of the web path. The issue is due to the html.php script not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the 'current_dir' variable.

Manual Testing Notes

http://[target]/[path]/viewers/html.php?current_dir=../../../../../../../etc/passwd%00 http://[target]/[path]/viewers/html.php?current_dir=../../../../../../../etc&filename=passwd

References:

Vendor URL: http://phpatm.free.fr/ Security Tracker: 1014930 Secunia Advisory ID:16867 Related OSVDB ID: 19524 Related OSVDB ID: 19526 Related OSVDB ID: 19529 Related OSVDB ID: 19530 Related OSVDB ID: 19523 Related OSVDB ID: 19528 Related OSVDB ID: 19532 Related OSVDB ID: 19533 Related OSVDB ID: 19527 Related OSVDB ID: 19531 Other Advisory URL: http://rgod.altervista.org/phpatm130.html CVE-2005-2997