exploit-db-mirror/platforms/cgi/webapps/22015.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

5 lines
No EOL
516 B
Text
Executable file

source: http://www.securityfocus.com/bid/6170/info
Versions of W3Mail 1.0.6 and greater are susceptible to a file disclosure vulnerability. To view attachments, the script "viewAttachment.cgi" accepts the parameter "file". The value of this parameter is passed to the open() function as the filename argument without being sanitized. Attackers may cause any file on the filesystem to open by specifying its relative path using directory traversal characters.
viewAttachment.cgi?file=../../../../../etc/passwd