[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

ByteHoard Directory Traversal Vulnerability



ByteHoard Directory Traversal Vulnerability
17 October 2003 

Original Advisory
http://www.sintelli.com/adv/sa-2003-03-bytehoard.pdf

Background
ByteHoard is online storage system whereby users can upload and download 
their files from anywhere with an Internet connection.

More information about the product is available here: 
http://bytehoard.sourceforge.net/index.php?about

Description
ByteHoard does not properly validate user-supplied input for URL 
requests.  This allows directory traversal characters to be added to URL 
request and thus allows directory traversal.

An example is:
http://victim.com/bytehoard/index.php?infolder=../../../../

Impact
It is possible for an attacker to view all files on the system.

Versions affected
Version 0.7

Solution
Upgrade to version 0.71

Tar version
http://prdownloads.sourceforge.net/bytehoard/bytehoard_point_seven_one.tar
.gz?download

Zip version
http://prdownloads.sourceforge.net/bytehoard/bytehoard_point_seven_one.zip
?download


Vulnerability History
16 Oct 2003     Identified by Ezhilan of Sintelli
17 Oct 2003     Issue disclosed to ByteHoard developer (Andrew Godwin)
17 Oct 2003     Vulnerability confirmed by Andrew Godwin
17 Oct 2003     Sintelli provided with fix
17 Oct 2003     Sintelli confirms vulnerability has been addressed
17 Oct 2003     Fix publicly available
17 Oct 2003     Sintelli Public Disclosure

Credit
Ezhilan of Sintelli discovered this vulnerability.

About Sintelli:
Sintelli is the world?s largest provider of security intelligence 
solutions.  Sintelli is the definitive source for IT Security 
intelligence and is a provider of third generation intelligence security 
solutions.  

Request a free trial of our alerting solution by clicking here 
http://www.sintelli.com/free-trial.htm

Copyright 2003 Sintelli Limited.  All rights reserved. www.sintelli.com