header-logo
Suggest Exploit
vendor:
csNews
by:
SecurityFocus
2,1
CVSS
LOW
Bypassing File Type Restrictions
264
CWE
Product Name: csNews
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: No
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Unix, Linux, Microsoft Windows
2002

Bypassing File Type Restrictions

csNews is a script for managing news items on a website. It is possible for a malicious admin user to bypass file type restrictions on the header and footer file. This may result in arbitrary system files being displayed to remote users, and the disclosure of sensitive information. The ability to exploit this vulnerability may only require 'public' access to csNews if used in conjunction with issues discussed in BID 4993.

Mitigation:

Restrict access to the csNews admin interface.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/4994/info

csNews is a script for managing news items on a website. It will run on most Unix and Linux variants, as well as Microsoft Windows operating systems.

It is possible for a malicious admin user to bypass file type restrictions on the header and footer file. This may result in arbitrary system files being displayed to remote users, and the disclosure of sensitive information.

The ability to exploit this vulnerability may only require "public" access to csNews if used in conjunction with issues discussed in BID 4993.

javascript:alert(document.form1.pheader.value='setup.cgi');