Tellme index.php q_Host Variable Malformed Input Path Disclosure

2005-10-05T05:07:33
ID OSVDB:19872
Type osvdb
Reporter Donnie Werner(morning_wood@exploitlabs.com)
Modified 2005-10-05T05:07:33

Description

Vulnerability Description

Tellme contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a remote attacker provides malformed input to the 'q_Host' variable of index.php, which will disclose the software's installation path resulting in a loss of confidentiality. While such information is relatively low risk, it is often useful in carrying out additional, more focused attacks.

Solution Description

Upgrade to version 1.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Tellme contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a remote attacker provides malformed input to the 'q_Host' variable of index.php, which will disclose the software's installation path resulting in a loss of confidentiality. While such information is relatively low risk, it is often useful in carrying out additional, more focused attacks.

Manual Testing Notes

http://[target]/net/index.php?q_IP=&q_Host=--+test.com&o_Server=on&o_Head=on

References:

Vendor URL: http://kimihia.org.nz/projects/tellme/ Secunia Advisory ID:17078 Related OSVDB ID: 19870 Related OSVDB ID: 19871 Other Advisory URL: http://exploitlabs.com/files/advisories/EXPL-A-2005-015-tellme.txt Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0107.html ISS X-Force ID: 22523 CVE-2005-4700