FULL PATH DISCLOSUR

Disclosed: 2014-04-17 19:12:58 By benamarouche To concretecms
Unknown
Vulnerability Details
Full Path Disclosure (FPD) vulnerabilities enable the attacker to see the path to the webroot/file. e.g.: /home/omg/htdocs/file/. Certain vulnerabilities, such as using the load_file() (within a SQL Injection) query to view the page source, require the attacker to have the full path to the file they wish to view. url: http://enterprise.concrete5.com/ How to fix this vulnerability Review the source code for this script. How to replicate: Cookie input CONCRETE5 was set to Error message found: <b>Warning</b>: session_start() [<a href='function.session-start'>function.session-start</a>]: The session id is too long or contains illegal characters, valid characters are a-z, A-Z, 0-9 and '-,' in <b>/home/enterpri/public_html/updates/concrete5.6.1.2_updater/concrete/startup/session.php</b> on line <b>36</b><br /> as we can see clearly the full path Affected params : / /index.php /tools/required/captcha
Actions
View on HackerOne
Report Stats
  • Report ID: 7736
  • State: Closed
  • Substate: resolved
  • Upvotes: 5
Share this report