[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

cPassMan v1.82 Arbitrary File Download

Author
Sense of Security
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-15857
Category
web applications
Date add
16-04-2011
Platform
php
Sense of Security - Security Advisory - SOS-11-004
 
Release Date.                  15-Apr-2011
Last Update.                   -
Vendor Notification Date.      7-Mar-2011
Product.                       Collaborative Passwords Manager (cPassMan)
Platform.                      Independent (PHP)
Affected versions.             1.82 (verified), and possibly others
Severity Rating.               Medium
Impact.                        Local file system access
Attack Vector.                 Remote without authentication
Solution Status.               Upgrade to v2.0, v1.x branch no longer
updated
CVE reference.                 Not yet assigned
 
Details.
A vulnerability has been discovered in the Collaborative Passwords Manager
(cPassMan) web application that can be exploited to retrieve files from the
local host file system. The input passed to the component
"sources/downloadfile.php" via the "path" variable allows the retrieval of
any
file on the local file system that the web server has access to. There is no
data validation or authorisation mechanisms present within this component.
 
Proof of Concept.
http://localhost/cpassman/sources/downloadfile.php?path=/etc/passwd
 
Solution.
The author (Nils Laumaille) has indicated that the v1.x branch of cPassMan
will no longer be updated, as he has rewritten the application and v2.0 is
now
the recommended release.
 
Discovered by.
Kaan Kivilcim - Sense of Security Labs.



#  0day.today [2024-12-27]  #