header-logo
Suggest Exploit
vendor:
mcNews
by:
SecurityFocus
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: mcNews
Affected Version From: mcNews
Affected Version To: mcNews
Patch Exists: YES
Related CWE: CVE-2002-1390
CPE: cpe:a:mcnews:mcnews
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Unix, Windows
2002

mcNews Directory Traversal

mcNews does not sufficiently filter dot-dot-slash (../) sequences from URL parameters, allowing a remote attacker to disclose the contents of arbitrary web-readable files that exist on a host running the vulnerable software.

Mitigation:

Filter dot-dot-slash (../) sequences from URL parameters.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/4770/info

mcNews is a set of scripts for allowing users to post news stories on a webpage. It will run on most Linux and Unix variants as well as Microsoft Windows operating systems.

mcNews does not sufficiently filter dot-dot-slash (../) sequences from URL parameters. As a result, a remote attacker can disclose the contents of arbitrary web-readable files that exist on a host running the vulnerable software. 

http://target/admin/header.php?voir=hop&skinfile=../../file