---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: FreeStyle Wiki CGI::Session "File" Driver "CGISESSID" Directory Traversal SECUNIA ADVISORY ID: SA31114 VERIFY ADVISORY: http://secunia.com/advisories/31114/ CRITICAL: Moderately critical IMPACT: Security Bypass WHERE: >From remote SOFTWARE: FreeStyle Wiki 3.x http://secunia.com/product/5189/ DESCRIPTION: Tan Chew Keong has reported a vulnerability in FreeStyle Wiki, which can be exploited by malicious people to bypass certain security restrictions. For more information: SA31117 Successful exploitation requires that the application is installed on a Windows system and that an attacker is able to place a file containing valid session data on a known location on the target system (e.g. via "Create New Page"). The vulnerability is reported in Stable Version 3.6.2 and Development Version 3.6.3dev3. SOLUTION: Apply patch. http://fswiki.org/wiki.pl?page=%CD%FA%CE%F2%2F2008%2D7%2D16 PROVIDED AND/OR DISCOVERED BY: Tan Chew Keong ORIGINAL ADVISORY: http://vuln.sg/fswiki362session-en.html OTHER REFERENCES: SA31117: http://secunia.com/advisories/31117/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------