Web Blog "dot dot" directory traversal
|webblog-dotdot-directory-traversal (14978)||Medium Risk|
Leif M. Wright's Web Blog could allow a remote attacker to traverse directories on the Web server. A remote attacker could send a specially-crafted URL request containing "dot dot" (../) sequences to read or download any file outside the Web root directory.
Upgrade to the latest version of Web Blog (1.1.5 or later), available from the Leif M. Wright's Communication Web site. See References.
- BugTraq Mailing List, Wed Jan 28 2004 - 04:15:40 CST : ZH2004-01SA (security advisory): Web Blog 1.1 Remote arbitrary files retrieving.
- Leif M. Wright's Communications Web site: Leif M. Wright.
- BID-9517: Leif M. Wright Web Blog File Disclosure Vulnerability
- CVE-2004-2127: Directory traversal vulnerability in Web Blog 1.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the file variable.
- OSVDB ID: 3739: Leif Wright Web Blog Directory Traversal
- SA10740: Web Blog Directory Traversal Vulnerability
- Leif Wright Web Blog 1.1
Jan 28, 2004
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this