Vulnerability in edittag.pl

From: kers0r (root@asylum-nz.com)
Date: Thu Jan 23 2003 - 22:33:08 PST

  • Next message: Diogo Fernandes: "RE: DoS attack on Windows 2000 Terminal Server"

    
     ('binary' encoding is not supported, stored as-is)
     EditTag is a script which facilitates website content management. EditTag allows users to edit pages using a web interface, but restricts editing to specific tagged areas of the document. This feature enables website managers to create a way for content authors who may not know HTML to update a web page in real time without having to worry about adversely affecting the underlying HTML code.
    The website is here http://www.thebilberry.com/greg/edittag/
    
    The problem with the script lies in the fact that it can be easily tricked into allowing any file to be called up from the remote server. An example exploit is as follows:
    
    http://www.anything.com/edittag/edittag.cgi?file=%2F..%2F..%2F..%2F..%2F..%2Fetc/passwd
    
    This example will grab the passwd file from the remote webserver, this is potentially dangerous. 
    
    
    The vendor has been contacted 
    
      
    



    This archive was generated by hypermail 2b30 : Fri Jan 24 2003 - 10:26:03 PST