FileVista versions prior to 6.1 leak internal path data and allow extraction outside of the stated path.
3c41a9d024130c7bed75e3f82d0c36623aba0b5bbf2db458319d7eee03859fcb
Hi list,
FileVista is an IIS package which installs a file server onto Windows
Server systems. More information can be obtained from their website at
http://www.gleamtech.com/filevista.
CVE-2014-8788: The zip file handling routines in FileVista leaks internal
paths when users attempt to write a zip file to a path in which the
FileVista user account does not have Write access to. The internal path is
the path at which FileVista is installed onto
("c:\\inetpub\\wwwroot\\FileVista" by default).
CVE-2014-8789: The zip file extraction routine does not validate the stated
path of the extracted files. Malicious users may modify the contents of the
zip file to cause the constituent files to be extracted above the normal
zip file root path. In certain misconfigurations, this could cause the user
to write aspx files to the "wwwroot/FileVista" directory and execute
arbitrary code.
GleamTech has released a new version of the FileVista software (v6.1) which
addresses the above issues.
/DS