exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Cloupia End-To-End FlexPod Management Directory Traversal

Cloupia End-To-End FlexPod Management Directory Traversal
Posted Jan 15, 2012
Authored by Chris Rock

Cloupia End-To-End FlexPod management suffers from a directory traversal vulnerability. jQuery File Tree is a configurable, AJAX file browser plugin for the jQuery javascript library utilized within the Cloupia application framework. Unauthenticated access to this module allows a remote attacker to browse the entire file system of the host server, beyond the realm of the web service itself.

tags | exploit, remote, web, javascript
SHA-256 | ff2259eefdd1326866c21277a83513321432a90dcb079b9ce2ebba2ff1882121

Cloupia End-To-End FlexPod Management Directory Traversal

Change Mirror Download
*Cloupia End-to-end FlexPod Management - Directory Traversal Vulnerability***

*Advisory Information*

Advisory ID: KUSTODIAN-2011-011

Date published: Jan 13, 2011

*Vulnerability Information*

Class: Directory Traversal

Remotely Exploitable: Yes

Locally Exploitable: Yes

*Software Description*

Provides end-to-end FlexPod management and automation across physical,
virtual, compute, storage and network resources.

Create internal private clouds rapidly with internal standards and
procedures to maximize the infrastructure investments.



Provides comprehensive physical and virtual infrastructure management and
automation.

Provides unified solution and single pane of glass for consistent and
connected experience across private, public & hybrid clouds.

*Vulnerability Description*

jQuery File Tree is a configurable, AJAX file browser plugin for the jQuery
javascript library utilised within the Cloupia application framework.

Unauthenticated access to this module allows a remote attacker to browse
the entire file system of the host server, beyond the realm of the web
service itself.

Cloupia are aware of this flaw and are releasing a patch to mitigate
access. End users are urged to update immediately by contacting the vendor.

http://www.cloupia.com



* **Technical Description*

The following process performed as an attacker to exploit this
vulnerability would be as follows:

The code for the jQuery File Tree Java-Server-Page file reads as follows:

<%@ page

import="java.io.File,java.io.FilenameFilter,java.util.Arrays"%>

<%

/**

* jQuery File Tree JSP Connector

* Version 1.0

* Copyright 2008 Joshua Gould

* 21 April 2008

*/

String dir = request.getParameter("dir");

if (dir == null) {

return;

}



if (dir.charAt(dir.length()-1) == '\\') {

dir = dir.substring(0, dir.length()-1) + "/";

} else if (dir.charAt(dir.length()-1) != '/') {

dir += "/";

}

if (new File(dir).exists()) {

String[] files = new File(dir).list(new FilenameFilter() {

public boolean accept(File dir, String name) {

return name.charAt(0) != '.';

}

});

Arrays.sort(files, String.CASE_INSENSITIVE_ORDER);

out.print("<ul class=\"jqueryFileTree\" style=\"display:
none;\">");

// All dirs

for (String file : files) {

if (new File(dir, file).isDirectory()) {

out.print("<li class=\"directory
collapsed\"><a href=\"#\" rel=\"" + dir + file + "/\">"

+ file + "</a></li>");

}

}

// All files

for (String file : files) {

if (!new File(dir, file).isDirectory()) {

int dotIndex = file.lastIndexOf('.');

String ext = dotIndex > 0 ?
file.substring(dotIndex + 1) : "";

out.print("<li class=\"file ext_" + ext +
"\"><a href=\"#\" rel=\"" + dir + file + "\">"

+ file + "</a></li>");

}

}

out.print("</ul>");

}

%>





*Credits*

This vulnerability was discovered by Chris Rock <team@kustodian.com> and
from Kustodian www.Kustodian.com.

*Disclaimer*

The contents of this advisory are copyright (c) Kustodian Security and may
be distributed freely provided that no fee is charged for this distribution
and proper credit is given.


Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close