SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Forum/Board/Portal)  >   phpNewsManager Vendors:   skintech.org
phpNewsManager Directory Traversal Hole Discloses Files to Remote Users
SecurityTracker Alert ID:  1009177
SecurityTracker URL:  http://securitytracker.com/id/1009177
CVE Reference:   CVE-2004-0327   (Links to External Site)
Updated:  Mar 23 2004
Original Entry Date:  Feb 23 2004
Impact:   Disclosure of system information, Disclosure of user information
Exploit Included:  Yes  
Version(s): 1.46
Description:   G00db0y from Zone-h Security Labs reported an input validation vulnerability in phpNewsManager. A remote user can traverse directories to view files on the system.

It is reported that the 'functions.php' script does not validate user-supplied input in the 'clang' variable. A remote user can supply a specially crafted value containing '../' directory traversal characters to view files on the system with the privileges of the web service.

A demonstration exploit URL is provided:

http://[target]/directory/functions.php?clang=../../../../../../../../../../../../etc/passwd

The vendor was reportedly notified on February 10, 2004.

The original advisory is available at:

http://www.zone-h.org/en/advisories/read/id=4024/

Impact:   A remote user can view files on the target system with the privileges of the web service.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.skintech.org/newman/ (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  ZH2004-09SA (security advisory): PhpNewsManager Remote arbitrary


ZH2004-09SA (security advisory): PhpNewsManager Remote arbitrary files retrieving

Discovered: 02 february 2004

Vendor Contacted: 10 february 2004

Published: 23 february 2004

Name: PhpNewsManager

Affected Systems: 1.46

Issue: Remote file retrieving

Author: G00db0y from Zone-h Security Labs - g00db0y@zone-h.org - zetalabs@zone-h.org

Vendor: http://www.skintech.org


Description

***********

Zone-h Security Team has discovered a flaw in PhpNewsManager. There is a vulnerability in 
the current version of PhpNewsManager that allows an attacker to retrieve arbitrary files 
from the webserver with its priviledges.
"phpNewsManager is the ultimate news manager for your website. The script is a whole 
solution for managing websites and supports many features with multi-level user access."


Details

*******


It's possibile for a remote attacker to retrieve any file from a webserver.

For example try this:

http://address/directory/functions.php?clang=../../../../../../../../../../../../etc/passwd




Solution:

*********

The vendor has been contacted and a patch was not yet produced.




G00db0y from Zone-h Security Labs - g00db0y@zone-h.org - zetalabs@zone-h.org

http://www.zone-h.org/en/advisories/read/id=4024/


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC