CVE-2004-0303

OWLS 1.0 - Info Disclosure

Title source: llm
STIX 2.1

Description

OWLS 1.0 allows remote attackers to retrieve arbitrary files via absolute pathnames in (1) the file parameter in /glossaries/index.php, (2) the filename parameter in /readings/index.php, or (3) the filename parameter in /multiplechoice/resultsignore.php, as demonstrated using /etc/passwd.

Exploits (3)

exploitdb WRITEUP VERIFIED
by G00db0y · textwebappsphp
https://www.exploit-db.com/exploits/23727
exploitdb WRITEUP VERIFIED
by G00db0y · textwebappsphp
https://www.exploit-db.com/exploits/23726
exploitdb WRITEUP VERIFIED
by G00db0y · textwebappsphp
https://www.exploit-db.com/exploits/23725

References (4)

Core 4
Core References
Mailing List mailing-list x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=107712123305706&w=2
Various Sources x_refsource_misc
http://www.zone-h.org/en/advisories/read/id=3973/
Exploit, Vendor Advisory vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/9689
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/15249

Scores

EPSS 0.0893
EPSS Percentile 92.6%

Details

Status published
Published Nov 23, 2004
Tracked Since Feb 18, 2026