Sense of Security – Security Advisory – SOS-11-004
Release Date. | 15-Apr-2011 |
Last Update. | – |
Vendor Notification Date. | 7-Mar-2011 |
Product. | Collaborative Passwords Manager (cPassMan) |
Platform. | Independent (PHP) |
Affected versions. | 1.82 (verified), and possibly others |
Severity Rating. | Medium |
Impact. | Local file system access |
Attack Vector. | Remote without authentication |
Solution Status. | Upgrade to v2.0, v1.x branch no longer updated |
CVE reference. | CVE – Not yet assigned |
Details.
A vulnerability has been discovered in the Collaborative Passwords Manager (cPassMan) web application that can be exploited to retrieve files from the local host file system. The input passed to the component “sources/downloadfile.php” via the “path” variable allows the retrieval of any file on the local file system that the web server has access to. There is no data validation or authorisation mechanisms present within this component.
Proof of Concept.
/812ec203ee00103a80d847d7c3d0ace6/cpassman/sources/downloadfile.php?path=/etc/passwd
Solution.
The author (Nils Laumaille) has indicated that the v1.x branch of cPassMan will no longer be updated, as he has rewritten the application and v2.0 is now the recommended release.
Discovered by.
Kaan Kivilcim – Sense of Security Labs.