Description
|
|
mr.pr0n has discovered two vulnerabilities in OneFileCMS, which can be exploited by malicious users to disclose sensitive information.
1) Input passed via the "i" parameter to onefilecms.php is not properly verified before being used to read folders. This can be exploited to disclose the folder structure of the filesystem via directory traversal sequences.
2) Input passed via the "f" parameter to onefilecms.php is not properly verified before being used to read files. This can be exploited to disclose the content of arbitrary files from local resources via directory traversal sequences.
The vulnerabilities are confirmed in version 1.1.5. Other versions may also be affected.
|
|
|
|
Vulnerable Products
|
|
Vulnerable Software: OneFileCMS 1.x
|
|
|
|
Solution
|
|
Edit the source code to ensure that input is properly verified.
|
|
|
|
CVE
|
|
|
|
|
|
References
|
|
http://ghostinthelab.wordpress.com/2012/03/16/onefilecms-v-1-1-5-local-file-inclusion-vulnerability/
|
|
|
|
Vulnerability Manager Detection
|
|
No
|
|
|
|
IPS Protection
|
|
|
|
|
|