Description:
CWH Underground has discovered two vulnerabilities in FOG Forum, which can be exploited by malicious people to disclose sensitive information.
Input passed to the "fog_lang" and "fog_skin" parameters in index.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local resources via directory traversal attacks and URL-encoded NULL bytes.
The vulnerabilities are confirmed in version 0.8.1. Other versions may also be affected.
Solution:
Edit the source code to ensure that input is properly verified.
Saturday, June 14, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment