BugTraq
ByteHoard Directory Traversal Vulnerability Oct 19 2003 07:16PM
Sintelli SINTRAQ (sintraq sintelli com)
ByteHoard Directory Traversal Vulnerability
17 October 2003

Original Advisory
http://www.sintelli.com/adv/sa-2003-03-bytehoard.pdf

Background
ByteHoard is online storage system whereby users can upload and download
their files from anywhere with an Internet connection.

More information about the product is available here:
http://bytehoard.sourceforge.net/index.php?about

Description
ByteHoard does not properly validate user-supplied input for URL
requests. This allows directory traversal characters to be added to URL
request and thus allows directory traversal.

An example is:
http://victim.com/bytehoard/index.php?infolder=../../../../

Impact
It is possible for an attacker to view all files on the system.

Versions affected
Version 0.7

Solution
Upgrade to version 0.71

Tar version
http://prdownloads.sourceforge.net/bytehoard/bytehoard_point_seven_one.t
ar
.gz?download

Zip version
http://prdownloads.sourceforge.net/bytehoard/bytehoard_point_seven_one.z
ip
?download

Vulnerability History
16 Oct 2003 Identified by Ezhilan of Sintelli
17 Oct 2003 Issue disclosed to ByteHoard developer (Andrew Godwin)
17 Oct 2003 Vulnerability confirmed by Andrew Godwin
17 Oct 2003 Sintelli provided with fix
17 Oct 2003 Sintelli confirms vulnerability has been addressed
17 Oct 2003 Fix publicly available
17 Oct 2003 Sintelli Public Disclosure

Credit
Ezhilan of Sintelli discovered this vulnerability.

About Sintelli:
Sintelli is the world?s largest provider of security intelligence
solutions. Sintelli is the definitive source for IT Security
intelligence and is a provider of third generation intelligence security
solutions.

Request a free trial of our alerting solution by clicking here
http://www.sintelli.com/free-trial.htm

Copyright 2003 Sintelli Limited. All rights reserved. www.sintelli.com

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus