Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker

Category:   Application (Forum/Board/Portal)  >   RCBlog Vendors:   Medling, Noah
RCBlog Input Validation Hole Lets Remote Users Traverse the Directory
SecurityTracker Alert ID:  1015523
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jan 23 2006
Impact:   Disclosure of authentication information, Disclosure of system information, Disclosure of user information, User access via network
Exploit Included:  Yes  
Version(s): 1.0.3
Description:   Aliaksandr Hartsuyeu of eVuln reported a vulnerability in RCBlog. A remote user can view certain files on the target system. A remote user can gain administrative access to the target application.

The 'index.php' script does not properly validate user-supplied input in the 'post' parameter. A remote user can supply a specially crafted parameter value containing '../' directory traversal characters to view files with the '.txt' file extension.

A remote user can exploit this to obtain the target administrators authentication credentials. An administrator can upload arbitrary files and execute them.

Also, by default, the software does not protect the files containing configuration information. A remote user can obtain usernames and hashed passwords.

A demonstration exploit is available at:

The original advisory is available at:

Impact:   A remote user can view files with the '.txt' file extension.

A remote user can obtain authentication data and then gain administrative access to the target application.

Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  [eVuln] RCBlog Directory Traversal & Sensitive Information Disclosure

New eVuln Advisory:
RCBlog Directory Traversal & Sensitive Information Disclosure


Software: RCBlog
Sowtware's Web Site:
Versions: 1.0.3
Critical Level: Dangerous
Type: Sensitive Information Disclosure
Class: Remote
Status: Unpatched
Exploit: Available
Solution: Not Available
Discovered by: Aliaksandr Hartsuyeu (
eVuln ID: EV0042

1. Directories data config are not protected by htaccess in default installiation. This can be used to retrieve registered user's
 information including logins and password's md5 hashes.

2. Directory traversal is possible.

Vulnerable script: index.php
Variable $_GET[post] isn't properly sanitized. This can be used to open arbitrary files with txt extention. Administrator's login
 and password is threatened.

Administrator has an ability to upload arbitrary files.

System access is possible.

Available at:

No Patch available.

Discovered by: Aliaksandr Hartsuyeu (


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, LLC