what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

QDAV-2001-7-3

QDAV-2001-7-3
Posted Jul 18, 2001
Site qDefense.com

qDefense Advisory Number QDAV-2001-7-3 - Interactive Story does not properly validate the contents of a hidden field entitled "next". Setting that field to the name of a file, and using double dots and poison nulls, an attacker can cause Interactive Story to display the contents of any file. Exploit URL included.

tags | exploit
SHA-256 | 97e8dec2dd73cc70c28c0ffa336013bf512a8924ca83704f520ae24b059baa61

QDAV-2001-7-3

Change Mirror Download
Interactive Story File Disclosure Vulnerability
qDefense Advisory Number QDAV-2001-7-3

Product: Interactive Story

Vendor: Valerie Mates (http://www.valeriemates.com)

Severity: Remote; Attacker may read arbitrary file

Versions Affected: Version 1.3

Vendor Status: Vendor contacted; has released new version, 1.4, which is
not vulnerable

Cause: Failure to validate input

In Short: Interactive Story does not properly validate the contents of a
hidden field entitled "next". By setting that field to the name of a file,
and using double dots and poison nulls, an attacker can cause Interactive
Story to display the contents of any file.


The current version of this document is available at
http://qDefense.com/Advisories/QDAV-2001-7-3.html.

Details:
Interactive Story contains the following lines:

$nextfile = "$story_dir/$in{'next'}.txt";
...
elsif ((-e $nextfile) && ($in{'submit'} eq "")) {
...

while (<STORY>) {
print $_;
}
...
}

If an attacker sets the "next" field to something like
../../../../../../../../../../etc/passwd%00, Interactive Story will open
and display the password file. This technique can be used to display any
file that the web server has permission to read.
Solution:

Valerie Mates has released an upgrade, version 1.4, which strips special
characters from the "next" field.




© 2001 qDefense Information Security Consultants. qDefense is a subsidiary
of Computer Modeling Corp.
This document may be reproduced, in whole or in part, provided that no
modifications are made and that proper credit is given. Additionally, if it
is made available through hypertext, it must be accompanied by a link to
the qDefense web site, http://qdefense.com.
qDefense Advisories
advisories@qDefense.com
qDefense - DEFENDING THE ELECTRONIC FRONTIER

qDefense offers a wide variety of security services
See http://qDefense.com/Services

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close