Description
Directory traversal vulnerability in OWLS 1.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the (1) file parameter in index.php, (2) editfile in glossary.php, or (3) editfile in newmultiplechoice.php.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by G00db0y · textwebappsphp
https://www.exploit-db.com/exploits/23724
exploitdb
WORKING POC
VERIFIED
by G00db0y · textwebappsphp
https://www.exploit-db.com/exploits/23722
exploitdb
WORKING POC
VERIFIED
by G00db0y · textwebappsphp
https://www.exploit-db.com/exploits/23723
References (4)
Core 4
Core References
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=107712123305706&w=2
Various Sources x_refsource_misc
http://www.zone-h.org/en/advisories/read/id=3973/
Exploit, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/9689
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/15249
Scores
EPSS
0.0893
EPSS Percentile
92.6%
Details
Status
published
Products (1)
fools_workshop/owls_workshop
1.0
Published
Nov 23, 2004
Tracked Since
Feb 18, 2026