[42359] in bugtraq

home help back first fref pref prev next nref lref last post

[eVuln] RCBlog Directory Traversal & Sensitive Information Disclosure

daemon@ATHENA.MIT.EDU (alex@evuln.com)
Fri Jan 20 19:03:15 2006

Date: 20 Jan 2006 10:15:48 -0000
Message-ID: <20060120101548.23238.qmail@securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: alex@evuln.com
To: bugtraq@securityfocus.com

New eVuln Advisory:
RCBlog Directory Traversal & Sensitive Information Disclosure
http://evuln.com/vulns/42/summary.html

--------------------Summary----------------

Software: RCBlog
Sowtware's Web Site: http://www.fluffington.com/
Versions: 1.0.3
Critical Level: Dangerous
Type: Sensitive Information Disclosure
Class: Remote
Status: Unpatched
Exploit: Available
Solution: Not Available
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)
eVuln ID: EV0042

-----------------Description---------------
1. Directories data config are not protected by htaccess in default installiation. This can be used to retrieve registered user's information including logins and password's md5 hashes.


2. Directory traversal is possible.

Vulnerable script: index.php
Variable $_GET[post] isn't properly sanitized. This can be used to open arbitrary files with txt extention. Administrator's login and password is threatened.

Administrator has an ability to upload arbitrary files.

System access is possible.

--------------Exploit----------------------
Available at: http://evuln.com/vulns/42/exploit.html


--------------Solution---------------------
No Patch available.

--------------Credit-----------------------
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)

home help back first fref pref prev next nref lref last post