exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Collaborative Passwords Manager (cPassMan) 1.82 Arbitrary File Download

Collaborative Passwords Manager (cPassMan) 1.82 Arbitrary File Download
Posted Apr 15, 2011
Authored by Kaan Kivilcim | Site senseofsecurity.com.au

Collaborative Passwords Manager (cPassMan) version 1.82 suffers from an arbitrary file download vulnerability.

tags | exploit, arbitrary
SHA-256 | 967826b2fe42669cdbb86c278cdcd41df4089bd07c90acbcb696c66c58c57b9f

Collaborative Passwords Manager (cPassMan) 1.82 Arbitrary File Download

Change Mirror Download
Sense of Security - Security Advisory - SOS-11-004

Release Date. 15-Apr-2011
Last Update. -
Vendor Notification Date. 7-Mar-2011
Product. Collaborative Passwords Manager (cPassMan)
Platform. Independent (PHP)
Affected versions. 1.82 (verified), and possibly others
Severity Rating. Medium
Impact. Local file system access
Attack Vector. Remote without authentication
Solution Status. Upgrade to v2.0, v1.x branch no longer
updated
CVE reference. Not yet assigned

Details.
A vulnerability has been discovered in the Collaborative Passwords Manager
(cPassMan) web application that can be exploited to retrieve files from the
local host file system. The input passed to the component
"sources/downloadfile.php" via the "path" variable allows the retrieval of
any
file on the local file system that the web server has access to. There is no
data validation or authorisation mechanisms present within this component.

Proof of Concept.
http://localhost/cpassman/sources/downloadfile.php?path=/etc/passwd

Solution.
The author (Nils Laumaille) has indicated that the v1.x branch of cPassMan
will no longer be updated, as he has rewritten the application and v2.0 is
now
the recommended release.

Discovered by.
Kaan Kivilcim - Sense of Security Labs.

About us.
Sense of Security is a leading provider of information
security and risk management solutions. Our team has expert
skills in assessment and assurance, strategy and architecture,
and deployment through to ongoing management. We are
Australia's premier application penetration testing firm and
trusted IT security advisor to many of the country's largest
organisations.

Sense of Security Pty Ltd
Level 8, 66 King St
Sydney NSW 2000
AUSTRALIA
T: +61 (0)2 9290 4444
F: +61 (0)2 9290 4455
W: http://www.senseofsecurity.com.au
E: info@senseofsecurity.com.au
Twitter: @ITsecurityAU

The latest version of this advisory can be found at:
http://www.senseofsecurity.com.au/advisories/SOS-11-004.pdf

Other Sense of Security advisories can be found at:
http://www.senseofsecurity.com.au/research/it-security-advisories.php
Login or Register to add favorites

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close