Martin Schulze wrote:
> Package: jsboard
> Version: 2.0.10-2
> Severity: grave
> Tags: sarge sid security patch
> 
> Please fix the directory traversal vulnerability.
> 
> http://marc.theaimsgroup.com/?l=bugtraq&m=110627201120011&w=2
> 
> Details
> =======
> PHP has a feature discarding the input values containing null characters
> when magic_quotes_gpc = off. Because JSBoard session.php doesn't sanitize
> $table variable, a malicious attacker can read arbitrary files.
> 
> ---
> include_once "include/print.php";
> parse_query_str();
> $opt = $table ? "&table=$table" : "";
> $opts = $table ? "?table=$table" : "";
> ...snip...
> ---
> 
> This is CAN-2005-0300
> URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0300
> 
> Reference: BUGTRAQ:20050120 STG Security Advisory: [SSA-20050120-22] JSBoard 
> file disclosure
> Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=110627201120011&w=2
> Reference: BID:12319
> Reference: URL:http://www.securityfocus.com/bid/12319
> Reference: XF:jsboard-session-file-include(18990)
> Reference: URL:http://xforce.iss.net/xforce/xfdb/18990

Wasn't this fixed in version 2.0.10-1?

-- 
see shy jo

Attachment: signature.asc
Description: Digital signature

Reply via email to