OWLS glossaries/index.php file Variable Arbitrary File Access

2004-02-18T04:07:15
ID OSVDB:3993
Type osvdb
Reporter OSVDB
Modified 2004-02-18T04:07:15

Description

Vulnerability Description

OWLS contains a flaw that allows a remote attacker to access arbitrary files outside of the web path. The issue is due to the glossaries/index.php not properly sanitizing user input supplied to the "file" variable.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

OWLS contains a flaw that allows a remote attacker to access arbitrary files outside of the web path. The issue is due to the glossaries/index.php not properly sanitizing user input supplied to the "file" variable.

Manual Testing Notes

http://[victim]/owls/glossaries/index.php?file=/etc/passwd

References:

Vendor URL: http://www.foolsworkshop.com/owls/ Secunia Advisory ID:10919 Related OSVDB ID: 4003 Related OSVDB ID: 4004 Related OSVDB ID: 4005 Related OSVDB ID: 4006 Related OSVDB ID: 4007 Other Advisory URL: http://www.zone-h.org/en/advisories/read/id=3973/ ISS X-Force ID: 15249 CVE-2004-0303