tel8618217223380 / prado3

Automatically exported from code.google.com/p/prado3
Other
0 stars 0 forks source link

Highly critical vulnerability discovered in Prado #349

Closed GoogleCodeExporter closed 9 years ago

GoogleCodeExporter commented 9 years ago
I've discovered a high severity information disclosure and data manipulation 
vulnerability in Prado, which allows retrieval and possibly also the 
destruction/removal of virtually any server-side file the web server process 
has access to. 

By using the exploit you might be able to for ex. retrieve the contents of a 
passwd file, any Prado source file, any system binary, and delete any and all 
source and/or data files on the web server (subject to file system permission 
of course).

It affects practically all Prado 3.x versions.

Have proof of concept exploit.

No full public disclosure, yet. Contact me for more information.

Original issue reported on code.google.com by google...@pcforum.hu on 15 Jul 2011 at 8:50

GoogleCodeExporter commented 9 years ago
Please send me an email rojaro@gmail.com

Original comment by rojaro@gmail.com on 16 Jul 2011 at 9:36

GoogleCodeExporter commented 9 years ago
patched in r3014, thank you

Original comment by ctrlal...@gmail.com on 16 Jul 2011 at 3:29

GoogleCodeExporter commented 9 years ago
Will there be a bugfix release for this issue?

Original comment by google...@pcforum.hu on 19 Jul 2011 at 5:36

GoogleCodeExporter commented 9 years ago
Absolutely. a 3.1.10 version has already been tagged, but unfortunately we 
lacked the time to run all the tests, create and release an updated package. It 
will be done as soon as possible.

Original comment by ctrlal...@gmail.com on 19 Jul 2011 at 2:38