Description
OWLS 1.0 allows remote attackers to retrieve arbitrary files via absolute pathnames in (1) the file parameter in /glossaries/index.php, (2) the filename parameter in /readings/index.php, or (3) the filename parameter in /multiplechoice/resultsignore.php, as demonstrated using /etc/passwd.
Exploits (3)
References (4)
Core 4
Core References
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=107712123305706&w=2
Various Sources x_refsource_misc
http://www.zone-h.org/en/advisories/read/id=3973/
Exploit, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/9689
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/15249
Scores
EPSS
0.0893
EPSS Percentile
92.6%
Details
Status
published
Published
Nov 23, 2004
Tracked Since
Feb 18, 2026