vendor:
SQL-Ledger
by:
bitform
7.5
CVSS
HIGH
Local File Include/Edit
98
CWE
Product Name: SQL-Ledger
Affected Version From: 2.8.33
Affected Version To: 2.8.33
Patch Exists: NO
Related CWE: None
CPE: sql-ledger
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Ubuntu Server 10.04
2011
SQL-Ledger <= 2.8.33 Post-authentication Local File Include/Edit Vulnerability
A vulnerability exists in the 'Stylesheet' link of SQL-Ledger that lets you view the contents of the stylesheet you have associated with your login. An 'Edit' link is at the bottom. If you edit the 'file' post parameter you can enter any relative or absolute file (/etc/passwd, sql-ledger.conf) that the web server has permission to read. If you have read and write access, you can save your modifications to the file with the 'Save' button. For example, everything including the sql-ledger.conf file is just a perl script, making dropping a perl shell trivial.
Mitigation:
Set the sql-ledger.conf file to read-only or owned by 'root:wheel' and set -rw--r--r.