SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (File Transfer/Sharing)  >   aMule Vendors:   amule.org
aMule Discloses Images and HTML/PHP Files to Remote Users
SecurityTracker Alert ID:  1016188
SecurityTracker URL:  http://securitytracker.com/id/1016188
CVE Reference:   CVE-2006-2691, CVE-2006-2692   (Links to External Site)
Updated:  Aug 18 2009
Original Entry Date:  May 31 2006
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 2.1.2
Description:   Some vulnerabilities were reported in aMule. A remote user can obtain files from the target system.

A remote user can specify a full path URL to access arbitrary images on the target system.

A remote authenticated user can supply a full path URL to access arbitrary HTML or PHP files on the target system.

Impact:   A remote user can access arbitrary images on the target system.

A remote authenticated user can access arbitrary HTML or PHP files on the target system.

Solution:   The vendor has issued a fixed version (2.1.2), available at:

http://www.amule.org/

Vendor URL:  www.amule.org/ (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:   Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Date:  Wed, 31 May 2006 01:12:00 -0400
Subject:  aMule vulnerabilities


http://www.amule.org/wiki/index.php/Changelog_2.1.2

Fixed security problems with aMuleWeb:
# All images could be accessed, even when not logged in, and this included dynamically 
generated images, such as progress bars and graphs, resulting in various information 
leakage.
# It was possible to craft an URL such that any image on the harddisk would be 
returned, provided that the full path was known. File types were decided by the 
filename extension and included 'gif', 'jpg', 'ico', 'png', 'bmp' and 'jpeg'.
# When logged in, it was possible to craft an URL such that any html or php file on the 
harddisk would be returned, provided that the full path was known. File types were 
decided by the filename extension and included 'html' and 'php'. 
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC