[Please upgrade when a patch comes out if you use edittag.pl -- Raju]

This is an RFC 1153 digest.
(1 message)
----------------------------------------------------------------------

Message-ID: <[EMAIL PROTECTED]>
From: kers0r <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Vulnerability in edittag.pl
Date: 24 Jan 2003 06:33:08 -0000



 EditTag is a script which facilitates website content management. EditTag allows 
users to edit pages using a web interface, but restricts editing to specific tagged 
areas of the document. This feature enables website managers to create a way for 
content authors who may not know HTML to update a web page in real time without having 
to worry about adversely affecting the underlying HTML code.
The website is here http://www.thebilberry.com/greg/edittag/

The problem with the script lies in the fact that it can be easily tricked into 
allowing any file to be called up from the remote server. An example exploit is as 
follows:

http://www.anything.com/edittag/edittag.cgi?file=%2F..%2F..%2F..%2F..%2F..%2Fetc/passwd

This example will grab the passwd file from the remote webserver, this is potentially 
dangerous. 


The vendor has been contacted 

  

------------------------------

End of this Digest
******************

-- 
Raj Mathur                [EMAIL PROTECTED]      http://kandalaya.org/
                      It is the mind that moves


-------------------------------------------------------
This SF.NET email is sponsored by:
SourceForge Enterprise Edition + IBM + LinuxWorld = Something 2 See!
http://www.vasoftware.com
_______________________________________________
linux-india-help mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/linux-india-help

Reply via email to