OSClass 目录遍历漏洞

漏洞信息详情

OSClass 目录遍历漏洞

漏洞简介

OSClass 2.3.6之前版本中存在目录遍历漏洞。远程攻击者可利用该漏洞通过在type参数中的a ..(点点)读取和写入任意文件。注:可利用该漏洞上传任意文件。

漏洞公告

目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:

http://osclass.org/blog/2012/03/05/osclass-2-3-6/

参考网址

来源: github.com

链接:https://github.com/osclass/OSClass/commit/ff7ef8a97301aaaf6a97fe46c2c27981a86b4e2f#diff-1

来源: github.com

链接:https://github.com/osclass/OSClass/commit/a40b76695994442644e46e1b776d79660500566a

来源: github.com

链接:https://github.com/osclass/OSClass/commit/1e7626f4e1a26371480989c0b937f107ea9a6d4b

来源: XF

名称: osclass-file-upload(73755)

链接:http://xforce.iss.net/xforce/xfdb/73755

来源: XF

名称: osclass-directory-traversal(73754)

链接:http://xforce.iss.net/xforce/xfdb/73754

来源: BID

名称: 52336

链接:http://www.securityfocus.com/bid/52336

来源: MLIST

名称: [oss-security] 20120404 Re: CVE request: OSClass directory traversal vulnerability

链接:http://www.openwall.com/lists/oss-security/2012/04/04/7

来源: MLIST

名称: [oss-security] 20120403 Re: CVE request: OSClass directory traversal vulnerability

链接:http://www.openwall.com/lists/oss-security/2012/04/03/1

来源: MLIST

名称: [oss-security] 20120402 Re: CVE request: OSClass directory traversal vulnerability

链接:http://www.openwall.com/lists/oss-security/2012/04/02/6

来源: MLIST

名称: [oss-security] 20120402 CVE request: OSClass directory traversal vulnerability

链接:http://www.openwall.com/lists/oss-security/2012/04/02/1

来源: www.codseq.it

链接:http://www.codseq.it/advisories/osclass_directory_traversal_vulnerability

来源: SECUNIA

名称: 48284

链接:http://secunia.com/advisories/48284

来源: osclass.org

链接:http://osclass.org/2012/03/05/osclass-2-3-6/

来源: BUGTRAQ

名称: 20120307 OSClass directory traversal (leads to arbitrary file upload)

链接:http://archives.neohapsis.com/archives/bugtraq/2012-03/0024.html

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享