vendor:
Cocoon
by:
SecurityFocus
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: Cocoon
Affected Version From: 2.1
Affected Version To: 2.2 before 22 Oct 2003
Patch Exists: YES
Related CWE: N/A
CPE: a:apache:cocoon
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2003
Apache Cocoon Directory Traversal Vulnerability
It has been reported that Apache Cocoon may be prone to a directory traversal vulnerability that may allow an attacker to traverse outside the server root directory by using '/./../' character sequences. The issue is caused by insufficient sanitization of user-supplied input to the 'filename' parameter in the sample 'view-source' script. This vulnerability may be successfully exploited to gain sensitive information about a vulnerable host that could be used to launch further attacks against the system.
Mitigation:
Ensure that user-supplied input is properly sanitized before being used in the 'filename' parameter of the 'view-source' script.