[Please upgrade when a patch comes out if you use edittag.pl -- Raju] This is an RFC 1153 digest. (1 message) ----------------------------------------------------------------------
Message-ID: <[EMAIL PROTECTED]> From: kers0r <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Vulnerability in edittag.pl Date: 24 Jan 2003 06:33:08 -0000 EditTag is a script which facilitates website content management. EditTag allows users to edit pages using a web interface, but restricts editing to specific tagged areas of the document. This feature enables website managers to create a way for content authors who may not know HTML to update a web page in real time without having to worry about adversely affecting the underlying HTML code. The website is here http://www.thebilberry.com/greg/edittag/ The problem with the script lies in the fact that it can be easily tricked into allowing any file to be called up from the remote server. An example exploit is as follows: http://www.anything.com/edittag/edittag.cgi?file=%2F..%2F..%2F..%2F..%2F..%2Fetc/passwd This example will grab the passwd file from the remote webserver, this is potentially dangerous. The vendor has been contacted ------------------------------ End of this Digest ****************** -- Raj Mathur [EMAIL PROTECTED] http://kandalaya.org/ It is the mind that moves ------------------------------------------------------- This SF.NET email is sponsored by: SourceForge Enterprise Edition + IBM + LinuxWorld = Something 2 See! http://www.vasoftware.com _______________________________________________ linux-india-help mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/linux-india-help
