header-logo
Suggest Exploit
vendor:
Cocoon
by:
SecurityFocus
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: Cocoon
Affected Version From: 2.1
Affected Version To: 2.2 before 22 Oct 2003
Patch Exists: YES
Related CWE: N/A
CPE: a:apache:cocoon
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2003

Apache Cocoon Directory Traversal Vulnerability

It has been reported that Apache Cocoon may be prone to a directory traversal vulnerability that may allow an attacker to traverse outside the server root directory by using '/./../' character sequences. The issue is caused by insufficient sanitization of user-supplied input to the 'filename' parameter in the sample 'view-source' script. This vulnerability may be successfully exploited to gain sensitive information about a vulnerable host that could be used to launch further attacks against the system.

Mitigation:

Ensure that user-supplied input is properly sanitized before being used in the 'filename' parameter of the 'view-source' script.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/8883/info

It has been reported that Apache Cocoon may be prone to a directory traversal vulnerability that may allow an attacker to traverse outside the server root directory by using '/./../' character sequences. The issue is caused by insufficient sanitization of user-supplied input to the "filename" parameter in the sample "view-source" script.

This vulnerability may be successfully exploited to gain sensitive information about a vulnerable host that could be used to launch further attacks against the system.

Apache Cocoon version 2.1 and 2.2 before 22 Oct 2003 have been reported to be affected by this issue, however other versions may be affected as well.

http://www.example.com:8888/samples/view-source?filename=../../../[existing_file]