QwikiWiki is reportedly susceptible to a remote directory traversal vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied input. A malicious user could issue a request containing directory traversal strings such as '..' to possibly view files outside the server root directory or the Web mail user's normal access rights. This would be in the context of the server, so only files that would normally be accessible to the server would be exposed. This could lead to a loss of integrity and/or confidentiality. Information gathered could also be used to enhance other avenues of attack on the underlying system. Version 1.4.1 of QwikiWiki is reported to be susceptible. Other versions may also be affected.
QwikiWiki is reportedly susceptible to a remote directory traversal vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied input. A malicious user could issue a request containing directory traversal strings such as '..' to possibly view files outside the server root directory or the Web mail user's normal access rights. This would be in the context of the server, so only files that would normally be accessible to the server would be exposed. This could lead to a loss of integrity and/or confidentiality. Information gathered could also be used to enhance other avenues of attack on the underlying system. Version 1.4.1 of QwikiWiki is reported to be susceptible. Other versions may also be affected.