Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:18201
HistoryOct 15, 2007 - 12:00 a.m.

[Full-disclosure] PHP File Sharing System 1.5.1

2007-10-1500:00:00
vulners.com
109

PHP File Sharing System - Directory traversal
±-------------------------------------------+

Author: Jonas Thambert
Date: 2007-10-13
URL: http://sourceforge.net/projects/phpfilesadmin/
Vendor Notified.
Version: 1.5.1 (latest)

[- Description -]

PHP File Sharing System is vulnerable to directory traversal due to
insufficient security validation and sanitization of user-data. The
vulnerability allows the attacker to list directories, delete
files and create new directories on the system with the same
permission as the webbserver-user.

Example - List /tmp directory:
http://www.xxxx.nu/fss/index.php?cam=/../../../../../../../../../../
…/tmp

To create dirs and delete files simple use the buttons in the
webbinterface.

[- Code Location -]
The vulnerable code is located in the index.php file. The
"$_GET['cam']" is the indata that needs to be checked and
sanitized.

[- Exploit -]
Not needed.


Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/