MyOWNspace File Download and Local File Inclusion Vulnerabilities
Description
Multiple vulnerabilities have been identified in MyOWNspace, which could be exploited by attackers to gain knowledge of sensitive information.
The first issue is caused by input validation errors in the "/classes/flash_mp3_player/extras/external_feeds/getfeed.php" and "/classes/flash_mp3_player.23/extras/external_feeds/getfeed.php" scripts when processing the "file" parameter, which could be exploited to download arbitrary files via directory traversal attacks.
The second vulnerability is caused by an input validation error in the "/myownad/index.php" script when processing the "u" parameter, which could be exploited by attackers to include local files with the privileges of the web server.
Vulnerable Products
Vulnerable Software: MyOWNspace version 8.2 and prior