-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 STG Security Advisory: [SSA-20041122-10] KorWeblog directory traversal vulnerability Revision 1.3 Date Published: 2004-11-22 (KST) Last Update: 2004-11-22 Disclosed by SSR Team (advisory@stgsecurity.com) Summary ======== KorWeblog is a weblog application used by many Korean Linux users. It has a directory traversal vulnerability that malicious attackers can get file lists of arbitrary directories. Vendor URL ========== http://weblog.kldp.org Vulnerability Class =================== Implementation Error: Input validation flaw Details ======= KorWeblog has a function to insert image icons when users post replies. This function is implemented in viewimg.php. It doesn't check user input correctly, so malicious attackers can modify $path variable and can get file lists of a target directory. http://[victim]/viewimg.php?path=images.d/face/../../../../../../../&form=Co m&var=faceicon Impact ====== Medium: Information disclosure Workaround ========== please download and apply viewimg.diff from http://kldp.net/tracker/index.php?func=detail&aid=300515&group_id=13&atid=30 0013 - --- viewimg-org.php 2004-09-21 13:08:15.000000000 +0900 +++ viewimg.php 2004-09-21 13:08:44.000000000 +0900 @@ -63,13 +63,13 @@